0a6dd069c057bb88df0fc7cddfd7298d273994e726fe747fffaff6b91d1bc6efe5e98f68ed762d20f8ee47ac5efd7bde79e106b84b886ab8cb69d8f3955ffd6eaca423b35d9a2d48444d296b5ac40877a137cdb150182c670abf67fdd8156a1a1da6eef74e1f6e01b771789d6b39fda761b0de124086c86d02e3912473efdc8082b3b9c97231464b6e286dbba0fa079d273ec82d620f459dda008d3975ac848794c9b47ac13bb401b1ed54544cfb010a929596a77ab12f8d78629ff81524fa66743e8197adaf9014fa51e590d6c54996dc52bca8cd965bcdcdc6d711d9b40b6fb5834e62e0ba5c41a25376393b1d79be14fee3400536f758c9c483a85d451b8f764241c2266e26449f588827ad7f2433c7810ef6f892d2da86b1109c14cef4c78796474b2f6d5c6761ea8debc6ad9a201395dbcc58d5dd098b965d76876d50dbd4cd1f3184a87cbd9d2c845d005ffece73dc9644c6d3876ea79c630d885ccf2ca10432094801bd0407f932f623132b66f690f59f163f942dd14f7a50881721e65ed674815fc0b70e57d2afdd90a58ea22cbefd117e7e2b3bbd08cf0287788d2e770cbc25bd10f5a0bf9d4fd604ff415b6e32bee283e8079c2f176911820de7d9a71d392796f396d0a4aebb1e54e1daf5a50712390e8294b288887da5ad9990b61846701c79de2f77c2fe259cb06e438b11d2b9fb9ef0dcd5666f3339326a46da9bd09d5004156eec0a4e09880a2a838fefc2d3a491eff358919d4c15ce6f0c9d32abdac334887be04601cfaf4092a8f4df25e8c4ea28ea8eb0d003d603ccc91a1555b2dc3b055c05d8b908a1d19890d7e31e6539e90021d57f040df5c2554d083c4345579c815c677d6e6a42e5b2e9f76635ec5908bd80bcb4fdb25012ea02104f86f9e31643608c1b18fcd94d04f59bc8658ebf09ca78837830c6453d8e143a474f715bacabc76f88e6742ac68fef2f6644bd0d3de978ff5f269b27ec6f1a5e025c2a0c01f1e9bf0ea7b4d54a80b4498a85307aad5f6098b335d22f0d31625ca95ed1856b55cd02dbf6431da0b536b7f5e073d22cbe7b09784f389a4935f5d854c64c7a3753f28dc2bac480343374d86f3278170233a3e74eaa461fad0590f8ce715981532203edaa762d23db1705e8efee53a85a8f5548a71d12a9644b025e782d88c87e46698ce1260a3ef37d8add19f895b712325e26ca5b6165e7ec28061925e18ca70f44c02d082cbb74e78915894a3a3de96f5ce3198d0b7e11d97a708dad811cc66424e1a741e979fdac0a15a62a5252b8f34deb23798f84469ddfc968e8961268868715affd8dc6a43b5c8716dd94372e331a6e0cebf4fd8696bc9133984e060efaee80f9921dbf3b18d510eff7fb414b961eba0e88f83dec6c66121ffe068f3a646eb86b631362d49cd38e1aa6704f0397908a0babf9cb962de4aec4b20530e2225e3ba7c8263d9a8a90640b12a9d0633eef22a42ccc478d1b0d1bf6a9590e0b9803479509c89b0187fb35ffe1aa6703e7d48c75281cdbbc6cce1e2e5f0bcd8689071747cdbac317a7d71430312927b95b1cd0fc15603da8395825aeb6499acc811e6974d4e46c8f6a7c17c8edc9727b9a68d65e7a1efb2b8085bbc0640e6fc56550a2e4e93d4b11bace5a9676716c44b1f2d5b2ab18ed45c6c71f6a58078d5814f925a52b1a601cd675c3e8ce218013895c071abcf2501cf24499cb5c3531b98a9b97dd762ed9af6f8d22c720f156c38eb7a27eabe22fa93d292497e8da1285ac223ad30a624542e2082f78adbe1059b2e7e6e831a850f0e9d71ade8c011cfbcb0718707fd6bf5b865c4af381bf431a5b22be6143ef12acb4e992c0361fabc14cfefeca590217c7416598a12623066e6b31b77c6839d6cc63e4a494d16616bcd0eab082b946bc90f324c3ffa131378b02937f677f6803f80d802cda7dac607aabe9df8bc19594711d12c85726ce4bcd6f686d13bbf391721f634b89216e1c947f88134c8b9df912306974a9140c68fe1badf8c0f693a197131846881f3ef0b3ae3ed3fbbde90b6acfa4e018000f1ac0b63bc4810690014d44dc8fe8ca5ac88f584a890f47786737a507cde305991ea0156db425e9f540b32ae01acf493db8bae8705fe46724dfdcb453cf4ee93b9305d29746b3628ea8e322ac70170ec02797e1c897e476f74d8b4d70eef872c4305015391304647c5c55171790e24188cd3e08db1b507f022b2b81c5d88abc776a41e0070c86c297ef832e548497a8b65e6bdc249c1a90ca0d72a0f2ff4b04206aad4c5bf55c7b84dde974a2e87504d2145aea3d3b478ebc028e88728b3e834d0f9f6ace8e0b570923b07e390971b035d9e4d1b6fd77db56f4196e55622c34897204690bfd3c69665a66e04f97d4b5e193f20632f5c57ab9aa496e274978b147f84bcf7e3be85bfa9245c2f55296619bdc9bdf1fb0986573206cc95ca47cb13cd663f82ea8042e42a3e8bc61c832f1745f83f1b8529d623406fa8184779141b58269adbd220afc546aa6a4d3be27567793a8fff83d71cec3ab7e59e5943f388ed3b1f3e8e254d6c6143fd0e63b4a2da47dbbebad178a323e2ccce33adeb1d4974c5cf6ab59c732afab6854a55cc165cefc17641bdb17e907d9d18b5dcc3155b8101153c30ccdc3e0bbf749bad08b4d201b35b564cb74323bdf6346bf956a3448ec6f7ca99f7e37a069b7771b32c15e2e0e5c9d6898e70e6ed0641516da2f95b7a34516883366b0b22358fd12e934934a4642ee1a8eb78225f74e8aa34e3906ed6d9585869a752e7db2b8c99a02c62512c1a435ae09fc7ef06caf578a4c7965ad684c044d336b8cf7e540cf14e6c6ebced155eb0c7b33a12754d451310adc3e5a737a31e978483004cc1a12c80c97cf316830a780b9dff407bf394b84ecbf377038", 0xb24, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) setgid(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r5, r6}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r7, 0x6}, 0x8) 17:38:08 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1, r5}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r5, r6}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r7, 0x6}, 0x8) [ 278.222518] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:38:08 executing program 1: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) setgid(r5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r5, r6}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r7, 0x6}, 0x8) 17:38:08 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000040)={0xcb, 0x7}) read(r0, &(0x7f0000000080)=""/136, 0xfffffffffffffeab) 17:38:08 executing program 2: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000000c0)=""/67) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0x56d) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000340)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}, {@dmask={'dmask', 0x3d, 0x5}}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000040)) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000240)=""/26) 17:38:08 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1, r5}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r5, r6}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r7, 0x6}, 0x8) [ 278.516448] audit: type=1800 audit(1569519488.386:280): pid=10818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16562 res=0 17:38:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x8, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) write$P9_RAUTH(r2, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x8, 0x2}}, 0x14) [ 278.551321] audit: type=1804 audit(1569519488.386:281): pid=10818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/101/file0" dev="sda1" ino=16562 res=1 17:38:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={0x0, @remote}, &(0x7f00000005c0)=0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) accept$packet(r6, &(0x7f0000002840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002880)=0x14) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r9}]}, 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000002d00)={'team0\x00', r9}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r11, 0x0) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000002d40)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000002e40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r13}]}, 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000002e80)={@loopback, @multicast2, 0x0}, &(0x7f0000002ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002f00)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003000)=0xe8) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r16, 0x0) getpeername$packet(r16, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x14) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r18, 0x0) getsockname$packet(r18, &(0x7f00000030c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003100)=0x14) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r20, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r20, 0x29, 0x22, &(0x7f0000003140)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000003240)=0xe8) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r22, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r22, 0x0, 0x10, &(0x7f0000003280)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000003380)=0xe8) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r25, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r26}]}, 0x28}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000034c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000102c0)={@local, 0x0}, &(0x7f0000010300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r29}]}, 0x28}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000010340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000010380)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000103c0)={'\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010400)={0x0, @dev, @loopback}, &(0x7f0000010440)=0xc) r33 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r33, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r33, 0x8933, &(0x7f0000010480)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000010d40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000010d00)={&(0x7f00000104c0)={0x814, r1, 0x200, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r7}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0x7, 0x3f, 0x4}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r12}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x17b}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x20, 0x3, 0x1f, 0x10000}]}}}]}}, {{0x8, 0x1, r14}, {0xec, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r19}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r21}}}]}}, {{0x8, 0x1, r23}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x64}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8, 0x1, r26}, {0x264, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x193}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}]}}, {{0x8, 0x1, r31}, {0x180, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x90b}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xe18}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r34}}}]}}]}, 0x814}, 0x1, 0x0, 0x0, 0x8}, 0xc040) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8b58ed7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='resuid=', @ANYRESHEX=0x0, @ANYBLOB="6c8018650620977c8a3ac62878214847c6a0000000002d35f15128a1f78d7f3b77e249d922dec1be62cd5498a805d13ffda7779146f73fec883148883cdf8eff939fc0cbbe6b7922d73c5604703daa99535c89354a116322f8ce5d70a0dee35c8b966c05016a0c4f"]) 17:38:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004f40)=[{{&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, 0x0}}, {{&(0x7f0000000280)={0x2, 0x4e1f, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="140004000000000000000000000000001100000000000000"], 0x18}}], 0x2, 0x0) 17:38:08 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 278.765921] audit: type=1804 audit(1569519488.386:282): pid=10818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/101/file0" dev="sda1" ino=16562 res=1 17:38:08 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r4 = getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1, r4}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r4, r5}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r6, 0x6}, 0x8) 17:38:08 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:08 executing program 1: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r5 = getgid() keyctl$chown(0x4, r4, 0x0, r5) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1, r5}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r5, r6}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r7, 0x6}, 0x8) 17:38:08 executing program 2: setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0xfffffffffffffcc1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0xfe) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e24, @loopback}], 0xb8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.events\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r6, 0x10001}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r7, 0xfffffffd}, 0x8) r8 = open(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r10, 0x80045700, &(0x7f00000000c0)) ftruncate(r9, 0x200004) sendfile(r0, r9, 0x0, 0x80001d00c0d0) write$P9_RWRITE(r8, &(0x7f0000000100)={0xb, 0x77, 0x2, 0x9}, 0xb) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) 17:38:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x6, 0x0) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000100)=0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x401, 0x8, 0x8, 0x80, 0x19, 0x9e, 0x7f, 0xff, 0x8, 0x7fff, 0x200, 0x100}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000080)=0x5, 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:09 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:09 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0xb24, 0xfffffffffffffffb) r4 = getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1, r4}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, r4, r5}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r6, 0x6}, 0x8) 17:38:09 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x200008, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = gettid() clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000002a80)=[{&(0x7f0000002540)=""/167, 0xa7}], 0x2c64cfcbf386355, &(0x7f0000000200)=[{&(0x7f0000000100)=""/139, 0xfffffffffffffe2c}, {&(0x7f0000000000)=""/38}, {&(0x7f0000000040)=""/9}, {&(0x7f00000001c0)=""/49}], 0x0, 0x0) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x0, 0x0) r2 = getpid() r3 = getpgid(r0) ptrace$setopts(0x4206, r3, 0x4, 0x20) wait4(r2, 0x0, 0x0, &(0x7f0000000100)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000280)=0x0) kcmp(r5, r2, 0x0, r1, 0xffffffffffffffff) 17:38:09 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r0, r2) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) r4 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r5 = dup(r4) ioctl$TIOCCONS(r5, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r5, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) stat(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r7) r8 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r9 = dup(r8) ioctl$TIOCCONS(r9, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r9, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}}, 0x78) r11 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r12 = dup(r11) ioctl$TIOCCONS(r12, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r12, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13}}}, 0x78) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r16 = dup(r15) ioctl$TIOCCONS(r16, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r16, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r17}}}, 0x78) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010004000000000002000200", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000700", @ANYRES32=r1, @ANYBLOB="040002000000000008000400", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="070000000fdfbc690e478b5cfc83bf1ff287f2cef14473f9c529b65b3c435af562ad15bbfdabcfbc891ed1ecaa76aa3469754a51356321fe0fa8664d22e852275f0f72857a284e2cd52cc8831e595348596aab0d5588a65e5946dd6bb3e1be19aa7daae8201fd5f1ad5bd0e53393f4ab08eef21de22718498ca7c0f8e060eca450f02af002b6b32c23cdef63a0dcc6d8974efc845b3cdb443d39fdd18e306b97227c70ec0bd378244c212d", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08003f8d", @ANYRES32=r17, @ANYBLOB="10000100000000002000070000000000"], 0x6c, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0x158) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r18, r19) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x80) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x20008000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r21 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r21, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x601000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f00000000c0)=""/114) r22 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r23 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r22, r23, 0x0, 0x1000007ffff000) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r24) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000006c0)) r25 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r25, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r25, 0x5501, 0x0) write$input_event(r25, &(0x7f00000002c0)={{0x0, 0x2710}, 0x15}, 0x90) r26 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r26, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) 17:38:09 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:09 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="adf1f298ac1bac9c3d6f3dd7088ea654b4d0c0216fd6039c9f3599f4eb90e9fa9662a65d09962ab7985f28190c268be092caad1a44a30b9cb7ffb74ba55a08d87a17b142b3767782e5b9dca7bf952e0c54fe24c41f7ec528036c0641a850e7e13bb3e1f8d628563930c484d5f4c7e6f57eb8210ae214170116934c7c4b9ecd38ebe379a4e370e6b036d4558d2c6a22f98bff9a1e6c0f32bd9fc1f1c2d3d42b351434a95544db8db01a6370828055e048246b9cca39ce36a812f2ce6975c8f20d8b1c156a842cc2ddce5ad756caa98ba0b4ceedb3f59dc50e2f832f77145425903391f84e4488e41d389923ee22c813923b0ddf78781242793b4a58b7d1b32f3c9e0e11f3ccd2bb9cb92364453a89cc9e9188cf075959f164daeb894937ef7ccfe675d841879bf5d9f41d427bee1a707fb5cdb87a369e7ad0778906f92d743ae9da5bd145c344ae748c41e4980816e6e5f30548125d8a8e78f08e742e876c3708db6934b9eadb446b7d406ded73d01f989936ca214b1c4cc24c741f9992e238a2d44fd9bdc474e11d3de5b86b97bb1468f0da8236c48e3dbe4925212dca23d462b8f87feefee83487ab429cb57aeb02c17e53ba39778e546ec827ffc5c0cc0ec0ddd876a0268ed27a1ffdd200d546ef1d9df96e0db747465df2e2ebdef50c907f5a23b0f23cefe866dc6a9e6e2fdb0e525ff5533e2bcb5df452e5601a840cca9fd0052ff1211276ec405e5816e41c010b242a63fa3b97b0a4d79fef738f263a16fbdb734fb11ef174bfd09709d8ebabe8e9b774c3a34d7f3146ead0cc4c6b329ec5ab3b4a58b40cf9f47199a794ccd89326d9e57d5d8faee65a21c34e49cb8994d6e69df42d0927cbe82e667cbd2ec0ecd89c8ba490ee78e4a11635587e5ccbb5fa3f93d3b776d4e522748e2bbf1dc2cb6d826a1d60d010981cf4305ec59f948f80a21c36ad3b10227825cde0c3f82f2960ddbc9e6dc31038f4b184440562cc3e74604b9162cec885324cfdf48da6c18c78fee359b53d8fe80e6b7a1d9fa37eda00179e517d9ef87c31486f184817051b7ff4421d016fad8728ce2d71435a102387084a9819b87c7858c267e1706455ee0a6dd069c057bb88df0fc7cddfd7298d273994e726fe747fffaff6b91d1bc6efe5e98f68ed762d20f8ee47ac5efd7bde79e106b84b886ab8cb69d8f3955ffd6eaca423b35d9a2d48444d296b5ac40877a137cdb150182c670abf67fdd8156a1a1da6eef74e1f6e01b771789d6b39fda761b0de124086c86d02e3912473efdc8082b3b9c97231464b6e286dbba0fa079d273ec82d620f459dda008d3975ac848794c9b47ac13bb401b1ed54544cfb010a929596a77ab12f8d78629ff81524fa66743e8197adaf9014fa51e590d6c54996dc52bca8cd965bcdcdc6d711d9b40b6fb5834e62e0ba5c41a25376393b1d79be14fee3400536f758c9c483a85d451b8f764241c2266e26449f588827ad7f2433c7810ef6f892d2da86b1109c14cef4c78796474b2f6d5c6761ea8debc6ad9a201395dbcc58d5dd098b965d76876d50dbd4cd1f3184a87cbd9d2c845d005ffece73dc9644c6d3876ea79c630d885ccf2ca10432094801bd0407f932f623132b66f690f59f163f942dd14f7a50881721e65ed674815fc0b70e57d2afdd90a58ea22cbefd117e7e2b3bbd08cf0287788d2e770cbc25bd10f5a0bf9d4fd604ff415b6e32bee283e8079c2f176911820de7d9a71d392796f396d0a4aebb1e54e1daf5a50712390e8294b288887da5ad9990b61846701c79de2f77c2fe259cb06e438b11d2b9fb9ef0dcd5666f3339326a46da9bd09d5004156eec0a4e09880a2a838fefc2d3a491eff358919d4c15ce6f0c9d32abdac334887be04601cfaf4092a8f4df25e8c4ea28ea8eb0d003d603ccc91a1555b2dc3b055c05d8b908a1d19890d7e31e6539e90021d57f040df5c2554d083c4345579c815c677d6e6a42e5b2e9f76635ec5908bd80bcb4fdb25012ea02104f86f9e31643608c1b18fcd94d04f59bc8658ebf09ca78837830c6453d8e143a474f715bacabc76f88e6742ac68fef2f6644bd0d3de978ff5f269b27ec6f1a5e025c2a0c01f1e9bf0ea7b4d54a80b4498a85307aad5f6098b335d22f0d31625ca95ed1856b55cd02dbf6431da0b536b7f5e073d22cbe7b09784f389a4935f5d854c64c7a3753f28dc2bac480343374d86f3278170233a3e74eaa461fad0590f8ce715981532203edaa762d23db1705e8efee53a85a8f5548a71d12a9644b025e782d88c87e46698ce1260a3ef37d8add19f895b712325e26ca5b6165e7ec28061925e18ca70f44c02d082cbb74e78915894a3a3de96f5ce3198d0b7e11d97a708dad811cc66424e1a741e979fdac0a15a62a5252b8f34deb23798f84469ddfc968e8961268868715affd8dc6a43b5c8716dd94372e331a6e0cebf4fd8696bc9133984e060efaee80f9921dbf3b18d510eff7fb414b961eba0e88f83dec6c66121ffe068f3a646eb86b631362d49cd38e1aa6704f0397908a0babf9cb962de4aec4b20530e2225e3ba7c8263d9a8a90640b12a9d0633eef22a42ccc478d1b0d1bf6a9590e0b9803479509c89b0187fb35ffe1aa6703e7d48c75281cdbbc6cce1e2e5f0bcd8689071747cdbac317a7d71430312927b95b1cd0fc15603da8395825aeb6499acc811e6974d4e46c8f6a7c17c8edc9727b9a68d65e7a1efb2b8085bbc0640e6fc56550a2e4e93d4b11bace5a9676716c44b1f2d5b2ab18ed45c6c71f6a58078d5814f925a52b1a601cd675c3e8ce218013895c071abcf2501cf24499cb5c3531b98a9b97dd762ed9af6f8d22c720f156c38eb7a27eabe22fa93d292497e8da1285ac223ad30a624542e2082f78adbe1059b2e7e6e831a850f0e9d71ade8c011cfbcb0718707fd6bf5b865c4af381bf431a5b22be6143ef12acb4e992c0361fabc14cfefeca590217c7416598a12623066e6b31b77c6839d6cc63e4a494d16616bcd0eab082b946bc90f324c3ffa131378b02937f677f6803f80d802cda7dac607aabe9df8bc19594711d12c85726ce4bcd6f686d13bbf391721f634b89216e1c947f88134c8b9df912306974a9140c68fe1badf8c0f693a197131846881f3ef0b3ae3ed3fbbde90b6acfa4e018000f1ac0b63bc4810690014d44dc8fe8ca5ac88f584a890f47786737a507cde305991ea0156db425e9f540b32ae01acf493db8bae8705fe46724dfdcb453cf4ee93b9305d29746b3628ea8e322ac70170ec02797e1c897e476f74d8b4d70eef872c4305015391304647c5c55171790e24188cd3e08db1b507f022b2b81c5d88abc776a41e0070c86c297ef832e548497a8b65e6bdc249c1a90ca0d72a0f2ff4b04206aad4c5bf55c7b84dde974a2e87504d2145aea3d3b478ebc028e88728b3e834d0f9f6ace8e0b570923b07e390971b035d9e4d1b6fd77db56f4196e55622c34897204690bfd3c69665a66e04f97d4b5e193f20632f5c57ab9aa496e274978b147f84bcf7e3be85bfa9245c2f55296619bdc9bdf1fb0986573206cc95ca47cb13cd663f82ea8042e42a3e8bc61c832f1745f83f1b8529d623406fa8184779141b58269adbd220afc546aa6a4d3be27567793a8fff83d71cec3ab7e59e5943f388ed3b1f3e8e254d6c6143fd0e63b4a2da47dbbebad178a323e2ccce33adeb1d4974c5cf6ab59c732afab6854a55cc165cefc17641bdb17e907d9d18b5dcc3155b8101153c30ccdc3e0bbf749bad08b4d201b35b564cb74323bdf6346bf956a3448ec6f7ca99f7e37a069b7771b32c15e2e0e5c9d6898e70e6ed0641516da2f95b7a34516883366b0b22358fd12e934934a4642ee1a8eb78225f74e8aa34e3906ed6d9585869a752e7db2b8c99a02c62512c1a435ae09fc7ef06caf578a4c7965ad684c044d336b8cf7e540cf14e6c6ebced155eb0c7b33a12754d451310adc3e5a737a31e978483004cc1a12c80c97cf316830a780b9dff407bf394b84ecbf377038", 0xb24, 0xfffffffffffffffb) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:09 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:09 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) read(r0, &(0x7f0000c7c000)=""/136, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r3, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}]}}]}, 0x5c}}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) accept$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) socket$netlink(0x10, 0x3, 0xe) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e000103000000000000000007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r9], 0x28}}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000000540)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000640)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000900)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x620202}, 0xc, &(0x7f00000008c0)={&(0x7f0000000680)={0x230, r3, 0x400, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r7}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x188, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x2, 0xff, 0x0, 0xaa}, {0x8001, 0x0, 0x0, 0x8}, {0x7, 0x6, 0x0, 0x46fe}, {0xff, 0x9, 0x5, 0x7}, {0x6, 0x8, 0x40, 0x96000}, {0x9, 0x2, 0x8, 0x8}, {0x1, 0x7, 0x1f, 0x50000}, {0x9, 0x80, 0x32, 0x4}, {0x3f, 0x3, 0x4, 0x2962be3d}]}}}]}}, {{0x8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}]}, 0x230}, 0x1, 0x0, 0x0, 0x20040001}, 0x40000) [ 279.801009] input: syz1 as /devices/virtual/input/input8 17:38:09 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 279.885366] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 17:38:09 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:09 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r0, r2) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) r4 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r5 = dup(r4) ioctl$TIOCCONS(r5, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r5, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) stat(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r7) r8 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r9 = dup(r8) ioctl$TIOCCONS(r9, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r9, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}}, 0x78) r11 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r12 = dup(r11) ioctl$TIOCCONS(r12, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r12, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13}}}, 0x78) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r16 = dup(r15) ioctl$TIOCCONS(r16, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r16, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r17}}}, 0x78) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010004000000000002000200", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000700", @ANYRES32=r1, @ANYBLOB="040002000000000008000400", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="070000000fdfbc690e478b5cfc83bf1ff287f2cef14473f9c529b65b3c435af562ad15bbfdabcfbc891ed1ecaa76aa3469754a51356321fe0fa8664d22e852275f0f72857a284e2cd52cc8831e595348596aab0d5588a65e5946dd6bb3e1be19aa7daae8201fd5f1ad5bd0e53393f4ab08eef21de22718498ca7c0f8e060eca450f02af002b6b32c23cdef63a0dcc6d8974efc845b3cdb443d39fdd18e306b97227c70ec0bd378244c212d", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08003f8d", @ANYRES32=r17, @ANYBLOB="10000100000000002000070000000000"], 0x6c, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0x158) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r18, r19) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x80) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x20008000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r21 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r21, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x601000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f00000000c0)=""/114) r22 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r23 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r22, r23, 0x0, 0x1000007ffff000) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r24) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000006c0)) r25 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r25, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r25, 0x5501, 0x0) write$input_event(r25, &(0x7f00000002c0)={{0x0, 0x2710}, 0x15}, 0x90) r26 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r26, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) [ 280.007661] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 17:38:10 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r0, r2) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) r4 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r5 = dup(r4) ioctl$TIOCCONS(r5, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r5, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) stat(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r7) r8 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r9 = dup(r8) ioctl$TIOCCONS(r9, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r9, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}}, 0x78) r11 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r12 = dup(r11) ioctl$TIOCCONS(r12, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r12, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13}}}, 0x78) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r16 = dup(r15) ioctl$TIOCCONS(r16, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r16, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r17}}}, 0x78) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010004000000000002000200", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000700", @ANYRES32=r1, @ANYBLOB="040002000000000008000400", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="070000000fdfbc690e478b5cfc83bf1ff287f2cef14473f9c529b65b3c435af562ad15bbfdabcfbc891ed1ecaa76aa3469754a51356321fe0fa8664d22e852275f0f72857a284e2cd52cc8831e595348596aab0d5588a65e5946dd6bb3e1be19aa7daae8201fd5f1ad5bd0e53393f4ab08eef21de22718498ca7c0f8e060eca450f02af002b6b32c23cdef63a0dcc6d8974efc845b3cdb443d39fdd18e306b97227c70ec0bd378244c212d", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08003f8d", @ANYRES32=r17, @ANYBLOB="10000100000000002000070000000000"], 0x6c, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0x158) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r18, r19) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x80) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x20008000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r21 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r21, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x601000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f00000000c0)=""/114) r22 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r23 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r22, r23, 0x0, 0x1000007ffff000) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r24) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000006c0)) r25 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r25, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r25, 0x5501, 0x0) write$input_event(r25, &(0x7f00000002c0)={{0x0, 0x2710}, 0x15}, 0x90) r26 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r26, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) 17:38:10 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5414, &(0x7f0000000200)=0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:10 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 280.463180] input: syz1 as /devices/virtual/input/input11 [ 280.480508] input: syz1 as /devices/virtual/input/input12 17:38:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x80, 0x2}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) r3 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r3, &(0x7f0000c7c000)=""/136, 0x88) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r3, 0xc0bc5351, &(0x7f0000000040)={0xb, 0x0, 'client1\x00', 0x0, "b7c4fbfa02a255b1", "4c9f577dec0611f8314359d0b3a5d315fa5261c38abe746d7276e9071a869b05", 0x7d5, 0x40}) 17:38:10 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:10 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r0, r2) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) r4 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r5 = dup(r4) ioctl$TIOCCONS(r5, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r5, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}}, 0x78) stat(&(0x7f0000000340)='./bus/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r7) r8 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r9 = dup(r8) ioctl$TIOCCONS(r9, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r9, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}}, 0x78) r11 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r12 = dup(r11) ioctl$TIOCCONS(r12, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r12, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r13}}}, 0x78) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x2) r16 = dup(r15) ioctl$TIOCCONS(r16, 0x541d) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r16, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r17}}}, 0x78) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="02000000010004000000000002000200", @ANYRES32=r1, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000700", @ANYRES32=r1, @ANYBLOB="040002000000000008000400", @ANYRES32=r6, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r7, @ANYBLOB="070000000fdfbc690e478b5cfc83bf1ff287f2cef14473f9c529b65b3c435af562ad15bbfdabcfbc891ed1ecaa76aa3469754a51356321fe0fa8664d22e852275f0f72857a284e2cd52cc8831e595348596aab0d5588a65e5946dd6bb3e1be19aa7daae8201fd5f1ad5bd0e53393f4ab08eef21de22718498ca7c0f8e060eca450f02af002b6b32c23cdef63a0dcc6d8974efc845b3cdb443d39fdd18e306b97227c70ec0bd378244c212d", @ANYRES32=r10, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08003f8d", @ANYRES32=r17, @ANYBLOB="10000100000000002000070000000000"], 0x6c, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000009c0)=0x158) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', r18, r19) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x80) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x20008000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r21 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r21, 0xc06864a2, &(0x7f0000000400)={0x0, 0x0, 0x200000000001d, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x601000, 0x0) ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f00000000c0)=""/114) r22 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r23 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r22, r23, 0x0, 0x1000007ffff000) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) lchown(&(0x7f0000000300)='./file0\x00', 0x0, r24) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000006c0)) r25 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r25, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_DEV_SETUP(r25, 0x5501, 0x0) write$input_event(r25, &(0x7f00000002c0)={{0x0, 0x2710}, 0x15}, 0x90) r26 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r26, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) 17:38:10 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:10 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000040)=""/255) r1 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r1, &(0x7f0000c7c000)=""/136, 0x88) 17:38:10 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:10 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:10 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) pipe(&(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) [ 281.144664] input: syz1 as /devices/virtual/input/input15 17:38:11 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 281.191328] kauditd_printk_skb: 10 callbacks suppressed [ 281.191342] audit: type=1800 audit(1569519491.056:293): pid=11001 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16864 res=0 17:38:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000080)) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000040)=0x6) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:11 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 281.334923] audit: type=1804 audit(1569519491.196:294): pid=11003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/104/file0" dev="sda1" ino=16864 res=1 17:38:11 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:11 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:11 executing program 1: close(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc8a83f2d431d77a2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) creat(&(0x7f00000001c0)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000000c0)={0x5095ec75, 0xfffffffffffff7ca}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast2}}, [0x2, 0x0, 0x9, 0x1, 0xaeb, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xadbc]}, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101c40, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000300)={r6, 0x10000, 0x5, r7}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000180)=0x4) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) 17:38:11 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:11 executing program 0: ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)=0x7) r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = getpgid(0xffffffffffffffff) move_pages(r1, 0x2, &(0x7f0000000180)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil], &(0x7f00000001c0)=[0x0, 0x5, 0x3, 0x5], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x28}, 0x16}}}, &(0x7f0000000300)=0x84) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) read(r0, &(0x7f0000000040)=""/136, 0x780) 17:38:11 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x3d3484, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00', 0x7, 0x4, 0x480, 0x118, 0x0, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000200), {[{{@uncond, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0xff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@dev={[], 0x19}, @remote, @multicast1, 0x4}}}, {{@arp={@rand_addr=0x1, @broadcast, 0xffffffff, 0xffffff00, @mac=@dev={[], 0x20}, {[0xff, 0x101, 0x0, 0x0, 0x0, 0xff]}, @mac=@local, {[0x0, 0xff, 0x0, 0x0, 0x0, 0x7f]}, 0x3, 0x3, 0x0, 0x0, 0x1, 0x6f3e, 'yam0\x00', 'syzkaller1\x00', {0xff}, {0xff}}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x24}, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000740)='/dev/media#\x00', 0xe732, 0x200000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000780)={{0xa, 0x4e21, 0x5, @ipv4={[], [], @rand_addr=0x1000}, 0x40}, {0xa, 0x4e20, 0x5, @mcast2, 0xf5ea}, 0xd17, [0x8, 0xfffffbff, 0xa67, 0x9, 0x1, 0x7ff, 0x6a0d, 0x2]}, 0x5c) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0400"/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000004010000fad94e33df00000000000000a7684184fdd867e6b4b947f3691667b438bb3a0440777b62249762f2fc165712e2b70280eca3f4a6a5446b4a98c480f000ed19a97c0dda2139f62084"], 0x48}}, 0x0) unshare(0x40000000) 17:38:11 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 281.973581] audit: type=1800 audit(1569519491.846:295): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16862 res=0 17:38:11 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000080)={0x6920229e, 0x9, 0x9, {0x77359400}, 0x3, 0x805}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(r1, 0x89e2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x6, 0x80000001, 0x8, 0x5, 0x19, 0x3, 0x0, 0x7a, 0x80, 0x80000001, 0x4, 0x1000}) read(r0, &(0x7f0000c7c000)=""/136, 0x88) [ 282.063309] audit: type=1804 audit(1569519491.846:296): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/105/file0" dev="sda1" ino=16862 res=1 17:38:12 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) fallocate(r3, 0x8, 0x0, 0x8000) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 282.219741] audit: type=1804 audit(1569519491.906:297): pid=11037 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/105/file0" dev="sda1" ino=16862 res=1 17:38:12 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 282.288542] IPVS: ftp: loaded support on port[0] = 21 17:38:12 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x884000, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000000)={0x16, 0x79, &(0x7f0000000080)="a8385605a9daeff1af72dd534a334430484e1e12608f6931bef44572bf941998202b2b50a1d4ddc2bd0fd2c237023519d1284c31b35c687eeac65c7fcfd37026cc4e29e96fef89d13c08382a47b7f0d15425d5ffaf29348398cb025ee299313bc3a21744e8c6a052a86d4d8a9f38a26475357c68214a2dc6e8"}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) ioctl$CAPI_NCCI_GETUNIT(r3, 0x80044327, &(0x7f0000000140)=0x4ba) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000100)=0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 17:38:12 executing program 1: close(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc8a83f2d431d77a2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) creat(&(0x7f00000001c0)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000000c0)={0x5095ec75, 0xfffffffffffff7ca}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast2}}, [0x2, 0x0, 0x9, 0x1, 0xaeb, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xadbc]}, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101c40, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000300)={r6, 0x10000, 0x5, r7}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000180)=0x4) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) [ 282.547030] audit: type=1800 audit(1569519492.416:298): pid=11064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16534 res=0 17:38:12 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:12 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 282.655103] audit: type=1804 audit(1569519492.446:299): pid=11064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/106/file0" dev="sda1" ino=16534 res=1 17:38:12 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) [ 282.697650] audit: type=1804 audit(1569519492.446:300): pid=11064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/106/file0" dev="sda1" ino=16534 res=1 17:38:12 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f0000000100)) read(r0, &(0x7f0000c7c000)=""/136, 0x88) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @reserved="44c6cd31b0f084887026e13d3855289c269db2e13083a08ab679814aa32932ae"}}) [ 283.027011] audit: type=1800 audit(1569519492.896:301): pid=11091 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16535 res=0 [ 283.159367] audit: type=1804 audit(1569519492.926:302): pid=11091 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/107/file0" dev="sda1" ino=16535 res=1 [ 283.368485] IPVS: ftp: loaded support on port[0] = 21 17:38:13 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) write$selinux_load(r2, &(0x7f0000000580)={0xf97cff8c, 0x8, 'SE Linux', "e6e3dee68d0ea2c4e71ff70dfbc15b041357abf8053e545920385666edc3a8bc723b10dbdd2ac94441aba3fad13aa56e6126b8006b18511c319d6801"}, 0x4c) read(r0, &(0x7f0000c7c000)=""/136, 0x88) recvmmsg(r1, &(0x7f0000000500)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)=""/195, 0xc3}, {&(0x7f0000000200)=""/61, 0x3d}, {&(0x7f0000000240)}], 0x3}, 0x2}, {{&(0x7f00000002c0)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000400)=""/70, 0x46}], 0x2, &(0x7f00000004c0)=""/8, 0x8}, 0x9}], 0x2, 0x20, 0x0) 17:38:13 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:13 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x2000000, 0x5) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:13 executing program 1: close(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc8a83f2d431d77a2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) creat(&(0x7f00000001c0)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000000c0)={0x5095ec75, 0xfffffffffffff7ca}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast2}}, [0x2, 0x0, 0x9, 0x1, 0xaeb, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xadbc]}, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101c40, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000300)={r6, 0x10000, 0x5, r7}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000180)=0x4) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) 17:38:13 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x101200, 0x0) write$FUSE_STATFS(r3, &(0x7f0000000240)={0x60, 0x0, 0x7, {{0x9, 0x5, 0x3, 0x9, 0x9, 0x0, 0x81}}}, 0x60) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000580)={@in6={{0xa, 0x4e21, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x10001}}, 0x0, 0x7, 0x0, "90bf34506c1d6a5cd9357ab0f084005addb2cca23d8f3b290a01ab5611fb94cd60daff58b6795d00d6322a2304626475b88185750ff0967e91d40e2a406b384c101af38f04b39f2efab2809f5d87f66b"}, 0xd8) write$P9_RSTATu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="600000007d020000004b004000040000004004000000050000000000000000002818010000070000000000000000000000000c00776c616e312d70726f63407b01002f00000b007b656d30c96367726f75700000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r5], 0x60) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:13 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(r3, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r4}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000005c0)={r5, 0x6}, 0x8) 17:38:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='uid_map\x00') openat(r0, &(0x7f0000000040)='./bus\x00', 0x4000, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000340)=""/199, 0x1b) getdents(r1, &(0x7f0000000080)=""/68, 0x44) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000340)=""/199, 0x1b) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x42, &(0x7f00000001c0)=0x2, 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000200)={'security\x00'}, &(0x7f0000000180)=0x54) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000440), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r6, 0x7fff) sendfile(r4, r6, 0x0, 0x8040fffffffd) 17:38:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) fdatasync(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) setsockopt$inet_mreq(r2, 0x0, 0x23, &(0x7f0000000240)={@remote, @local}, 0x8) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r1}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000200)={0xfffffffffffffff9, 0x3, 0x25b9, 0x7fe8c77aa9288f96, 0x7f}) 17:38:14 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) accept$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x4603, 0x0) ioctl$NBD_CLEAR_QUE(r8, 0xab05) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$evdev(0xffffffffffffffff, &(0x7f0000000240)=[{{r2, r3/1000+10000}, 0x0, 0x6, 0x7}, {{r4, r5/1000+10000}, 0x3, 0x61d7, 0x8000}, {{}, 0x14, 0x7, 0x62}, {{0x77359400}, 0x5}, {{r6, r7/1000+30000}, 0x15, 0x4, 0x1000}, {{0x77359400}, 0x3, 0x8001, 0x1000}, {{0x77359400}, 0x12, 0x3ff, 0x2}, {{r9, r10/1000+10000}, 0x3, 0x4, 0x9}], 0xc0) 17:38:14 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r3}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r4, 0x6}, 0x8) 17:38:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000080)="11f0a505ba583bcb7bf070") r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x101000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000003580)={'team0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000240)="fac3eb9cea595ac89d127a2faa59e09de80f6ccfc09f25ec654b25b32e8012f5ecc0704f20d23bd58d86cc87d6f3c75b31080c0de968bc8559308552dff3670ec9cd181dbaf8933a971f89cfbd3dd61d962fbc7f31ce852ad99c15b347c1dc8aa9412652f7d06dd16c66bd05033e4fe4f6ff1cef363e38cbf5d794415f3780", 0x7f, 0x20000000, &(0x7f00000035c0)={0x11, 0x5, r3, 0x1, 0x7, 0x6, @remote}, 0x14) r4 = socket$inet(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x21, &(0x7f0000000000)=[{&(0x7f00000002c0)="24000000210007041dfffd946f610500020000e8fe02000000010800040011000420ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54e81dd5aca6e8815a0c4bb5c4435b3e2faecbe09c166f90031b29483c958f026091c491499a64586a393750b250f7b80e872940c58659133e7101d22b73eaf0c4e87135dc67a6a62d471d12c637c656247c09", 0x4c}], 0x1}, 0x0) 17:38:14 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x141880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:14 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:14 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:14 executing program 1: close(0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc8a83f2d431d77a2, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) creat(&(0x7f00000001c0)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000000c0)={0x5095ec75, 0xfffffffffffff7ca}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e20, 0x0, @mcast2}}, [0x2, 0x0, 0x9, 0x1, 0xaeb, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xadbc]}, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x60, 0x0, 0xfffffdb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101c40, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000300)={r6, 0x10000, 0x5, r7}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000100), &(0x7f0000000180)=0x4) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) [ 284.682932] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 17:38:14 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = geteuid() ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', r2, 0x0, r3}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r4, 0x6}, 0x8) 17:38:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r3, 0x0) ioctl$KVM_NMI(r2, 0xae9a) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:38:15 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:15 executing program 1: socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000380)=0x331) prctl$PR_GET_FP_MODE(0x2e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$GETNCNT(0x0, 0x1, 0xe, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_open_procfs(0x0, &(0x7f0000000200)='\x00') socket$inet6_tcp(0xa, 0x1, 0x0) r2 = creat(0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(r2, 0x0, 0x4c8bd67b65212e10) 17:38:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x4, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) clock_settime(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=r0, @ANYBLOB="0400000000000000080000002a376cf497ced7e0d2b46404fa7d6ce719a0332c285da479149ef2d5e2bcca5b06e5ccdffaf5f09cbfb1b91b0b21e46e67d137d6029c369089c52112038d50c25faf9876c326651b261207645b9276a0a33ac2181d075a5a3de13bc222980cea18da0472596c362e0bdcfee9cb18417be8dd43f3385a43cf605d0e0e941118fa70aba97a", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="10000000000000002000040000000000"], 0x4c, 0x0) fchdir(0xffffffffffffffff) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f0000000300)=0x5, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x9) read(r2, &(0x7f0000c7c000)=""/136, 0xfffffffffffffd96) 17:38:15 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) [ 285.625915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 17:38:16 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:16 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:16 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:16 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:16 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000240)=0x5000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimensat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaab7a, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x400, 0x0) [ 286.203142] kauditd_printk_skb: 15 callbacks suppressed [ 286.203155] audit: type=1800 audit(1569519496.076:318): pid=11226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16903 res=0 17:38:16 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) [ 286.384453] audit: type=1804 audit(1569519496.126:319): pid=11226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir126969023/syzkaller.np6pfh/95/file0" dev="sda1" ino=16903 res=1 17:38:16 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffbf, 0xffffffffffffffff, 0x8) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x40800) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) 17:38:16 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:16 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') request_key(0x0, &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4}, 0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:16 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 286.744181] audit: type=1804 audit(1569519496.156:320): pid=11226 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir126969023/syzkaller.np6pfh/95/file0" dev="sda1" ino=16903 res=1 [ 286.950841] audit: type=1800 audit(1569519496.226:321): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16538 res=0 [ 287.106738] audit: type=1804 audit(1569519496.236:322): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/112/file0" dev="sda1" ino=16538 res=1 [ 287.271121] audit: type=1804 audit(1569519496.246:323): pid=11230 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/112/file0" dev="sda1" ino=16538 res=1 [ 287.396115] audit: type=1804 audit(1569519496.556:324): pid=11247 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir771347988/syzkaller.jvILOC/133/file0" dev="sda1" ino=16892 res=1 [ 287.501931] audit: type=1800 audit(1569519496.756:325): pid=11254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=16901 res=0 [ 287.577395] audit: type=1804 audit(1569519496.816:326): pid=11254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir126969023/syzkaller.np6pfh/96/file0" dev="sda1" ino=16901 res=1 [ 287.691046] audit: type=1804 audit(1569519496.836:327): pid=11254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir126969023/syzkaller.np6pfh/96/file0" dev="sda1" ino=16901 res=1 17:38:18 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = gettid() perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r2}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r3, 0x6}, 0x8) 17:38:18 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:18 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0xff00000000000000}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1f3) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1f3) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') sendfile(r1, r1, 0x0, 0x1f3) openat$cgroup_procs(r1, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) 17:38:18 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000640)='/dev/snd/timer\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000000c0)={0x2, 0x0, 0x7ffffffc}) 17:38:18 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:18 executing program 0: r0 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, r0, &(0x7f00000000c0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', '/dev/snd/seq\x00', 0x20, 0xffffffff}, 0x38, r1) r2 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) ioctl$PPPIOCDISCONN(r3, 0x7439) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r2, &(0x7f0000c7c000)=""/136, 0x88) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x201000, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d66642c72bf0fb5a83d", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c631c52c2da449bc6e440c4616368653d667363616368652c667363616368652c616669093d3078303030303030303030303030303030302c63616368657461673d2f2b63616134050000697a653d307830303030303030303030303038616d6d61702c66736d616769633d3078303030303030b07375626a5f726f6c653d2c0008000000000000000000000000000000000000000000000000cae377538fc6dc754a3d3ee1481b81ac84366f96d57db6b85d75cd61277399eb5ae5a4"]) 17:38:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x4, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) clock_settime(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=r0, @ANYBLOB="0400000000000000080000002a376cf497ced7e0d2b46404fa7d6ce719a0332c285da479149ef2d5e2bcca5b06e5ccdffaf5f09cbfb1b91b0b21e46e67d137d6029c369089c52112038d50c25faf9876c326651b261207645b9276a0a33ac2181d075a5a3de13bc222980cea18da0472596c362e0bdcfee9cb18417be8dd43f3385a43cf605d0e0e941118fa70aba97a", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="10000000000000002000040000000000"], 0x4c, 0x0) fchdir(0xffffffffffffffff) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f0000000300)=0x5, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x9) read(r2, &(0x7f0000c7c000)=""/136, 0xfffffffffffffd96) 17:38:18 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) gettid() syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet(0x2, 0x4, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)}, 0x0) clock_settime(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=r0, @ANYBLOB="0400000000000000080000002a376cf497ced7e0d2b46404fa7d6ce719a0332c285da479149ef2d5e2bcca5b06e5ccdffaf5f09cbfb1b91b0b21e46e67d137d6029c369089c52112038d50c25faf9876c326651b261207645b9276a0a33ac2181d075a5a3de13bc222980cea18da0472596c362e0bdcfee9cb18417be8dd43f3385a43cf605d0e0e941118fa70aba97a", @ANYRES32=r1, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB="10000000000000002000040000000000"], 0x4c, 0x0) fchdir(0xffffffffffffffff) setsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f0000000300)=0x5, 0x4) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) syz_open_dev$sndtimer(0x0, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000040)=0x9) read(r2, &(0x7f0000c7c000)=""/136, 0xfffffffffffffd96) 17:38:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x1) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:18 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) gettid() syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:18 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2c8) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000280)={r0, r3, 0x4, 0x7e, &(0x7f00000000c0)="b64607c91bf7f3c5504c63083dfaf56eb79cf5860fbf0085497b6d81f1a3ec1e9462d3b5ba4d6118f10ce6d5374644a3572979276978cce89ebba11e4628f3ab51459cc71442d83cce230919435924b648270500fd3d1156876d89af8e4c37e904669e3f7ac8bca8b89931469b8ba25fe6d858909566b2ae6d8d8ae18967", 0x4, 0x0, 0x70, 0x8, 0xfffb, 0x6, 0x200, 'syz1\x00'}) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) dup2(r1, r4) 17:38:18 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) read(r2, &(0x7f0000c7c000)=""/136, 0x65) 17:38:18 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:18 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) gettid() syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:19 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000380), 0x4) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 17:38:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/Q\xc0v/\x12F\xf9\xce\xf32g\xdar\x00', 0x8080, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="0102000b0100351767d62bb1f7ff67427b08f1466594320cc5e505c1d83684b0c298b90000", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000080)={r4}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r4, 0x80000000}, &(0x7f0000000080)=0x8) 17:38:20 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:20 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:20 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) clock_settime(0x3, &(0x7f0000000040)={0x0, 0x989680}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) 17:38:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000380), 0x4) writev(r0, &(0x7f000063e000)=[{&(0x7f00000000c0)="da", 0x1}], 0x1) close(r0) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 17:38:20 executing program 2: sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) getpid() sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x8000) getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) 17:38:20 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000000000000, 0xfffffffc}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) read$eventfd(r1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000300)=0xfffffffb, 0x4) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x0f', 0x1ff) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) read$eventfd(r2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000340)={'team0\x00', @local}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x107ff) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x6af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x200, 0xb2, 0x2, 0x7, 0x0, 0x61fe, 0x20022, 0x4, 0x1, 0xea1c, 0x8000, 0x0, 0x20, 0x6, 0x3, 0x9632, 0x9, 0x0, 0xffffffffffffff81, 0x0, 0x8, 0x1, 0x3, 0x800, 0x0, 0x7, 0x1, 0x10000000, 0x0, 0x0, 0x1, 0x0, 0x9, 0x20, 0x0, 0x7, 0x0, 0x5b, 0x0, @perf_bp={&(0x7f00000006c0), 0x1}, 0x100, 0x7, 0xce, 0x0, 0x4, 0x200, 0x80}, 0x0, 0xffffffffffffffff, r4, 0x1) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x12f041d2, 0x9, 0x0, 0x0, 0x0, 0x3, 0x204, 0xd, 0x5, 0x7fffffff, 0x0, 0x1, 0x3, 0x26d, 0x4, 0x0, 0x4, 0x55a0fb9d, 0x0, 0x80, 0x0, 0x0, 0x80, 0x3, 0x80, 0x1ff, 0x3, 0x0, 0x0, 0x9, 0x10001, 0x0, 0x101, 0x9c0, 0x2, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0x3}, 0x400, 0x0, 0x0, 0x9, 0x1, 0x2, 0xb10}, r6, 0x1, r5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r6, r4, 0x0, 0x14, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) write$selinux_access(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="73887374656d5f753a6f626a6563745f723a68616c645f7661725f6c07625f743a73302073797374656d5f753a73797374656d5f723a6b65726e656c5f74"], 0x3e) 17:38:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:20 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) getpeername$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:20 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:21 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:21 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r1}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r2, 0x6}, 0x8) 17:38:21 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = semget$private(0x0, 0x4, 0x400) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f0000000000)=""/200) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20004ffc, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000380)={0x0, 0x50323234, 0x0, @discrete={0x8}}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r2, &(0x7f0000000640), 0x0, 0x24008086, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) socket$inet6(0xa, 0x88000000000805, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x100) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000100)=0x200, 0x4) [ 291.362521] kauditd_printk_skb: 8 callbacks suppressed [ 291.362534] audit: type=1800 audit(1569519501.236:336): pid=11398 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16947 res=0 17:38:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000040)=""/84, &(0x7f00000000c0)=0x54) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000100)={'sit0\x00'}) read(r0, &(0x7f0000c7c000)=""/136, 0x88) [ 291.532304] protocol 88fb is buggy, dev hsr_slave_0 [ 291.537790] protocol 88fb is buggy, dev hsr_slave_1 [ 291.553232] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:21 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 291.611893] protocol 88fb is buggy, dev hsr_slave_0 [ 291.617020] protocol 88fb is buggy, dev hsr_slave_1 17:38:21 executing program 2: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000100)=""/209, &(0x7f0000000200)=0xd1) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000340)=@get={0x1, &(0x7f0000000300)=""/32, 0x75}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000240)={0x5, 0x7ff, 0xffff0000, 0x200, 0x9, 0x2}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x400) getresuid(&(0x7f0000000400), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) fsetxattr$security_capability(r3, &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x8, 0x7}, {0x40, 0x200}], r4}, 0x18, 0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x100000, 0x0) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f00000000c0)=""/25) prctl$PR_GET_FPEXC(0xb, &(0x7f00000002c0)) ioctl$VHOST_SET_VRING_ENDIAN(r2, 0x4008af13, &(0x7f0000000040)={0x3, 0x9}) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:21 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 291.861853] protocol 88fb is buggy, dev hsr_slave_0 [ 291.867454] protocol 88fb is buggy, dev hsr_slave_1 [ 292.056286] audit: type=1800 audit(1569519501.926:337): pid=11438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16866 res=0 [ 292.176383] audit: type=1804 audit(1569519501.926:338): pid=11438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/117/file0" dev="sda1" ino=16866 res=1 [ 292.236074] audit: type=1804 audit(1569519501.946:339): pid=11438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/117/file0" dev="sda1" ino=16866 res=1 [ 292.279463] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.1'. [ 292.411858] protocol 88fb is buggy, dev hsr_slave_0 [ 292.417137] protocol 88fb is buggy, dev hsr_slave_1 17:38:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:22 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:22 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/4096) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x4, 0x1000000004, 0xfffffffd, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0}, 0x3c) 17:38:22 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:22 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x60080) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="01000000b8c5bad20907abb8a8", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000680)={r4, @in={{0x2, 0x4e22, @multicast2}}, 0x1, 0x40}, &(0x7f0000000240)=0x90) r5 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r6 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f0000000640)={0x14, 0x28, &(0x7f0000000600)="3338b64709916196a1b24dd7a33f79d2e5973f8cbcfc3f206afeb93c3f7a6669aa06ec41f87d8eab"}) ioctl$SIOCAX25CTLCON(0xffffffffffffffff, 0x89e8, &(0x7f00000003c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x13, 0x800, 0x0, [@default, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000040)={0x80, 0x7f, 0x10000, 0x10001, 0x7f}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r5, &(0x7f0000c7c000)=""/136, 0x88) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x1c, 0x0, 0x10, 0x70bd29, 0x25dfdbff}, 0x1c}}, 0x10004010) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000580)={0x8, 0x7ff}) getpeername(r7, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000100)=0x80) 17:38:22 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 292.725191] audit: type=1800 audit(1569519502.596:340): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16959 res=0 17:38:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:22 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 292.881987] audit: type=1804 audit(1569519502.656:341): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir322571917/syzkaller.H2wNHM/114/file0" dev="sda1" ino=16959 res=1 17:38:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getpid() socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x3}) pipe(0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x12040, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x8) getsockopt$packet_int(r2, 0x107, 0x0, 0x0, &(0x7f0000000340)) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) renameat2(0xffffffffffffffff, &(0x7f0000000240)='./bus\x00', r2, &(0x7f00000002c0)='./bus\x00', 0x2) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) [ 293.077159] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:23 executing program 4: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 293.107266] audit: type=1400 audit(1569519502.666:342): avc: denied { map } for pid=11449 comm="syz-executor.0" path="/dev/snd/seq" dev="devtmpfs" ino=16108 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 293.131800] protocol 88fb is buggy, dev hsr_slave_0 [ 293.138085] protocol 88fb is buggy, dev hsr_slave_1 17:38:23 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:23 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 293.341054] audit: type=1804 audit(1569519502.676:343): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir322571917/syzkaller.H2wNHM/114/file0" dev="sda1" ino=16959 res=1 [ 293.502979] audit: type=1800 audit(1569519502.756:344): pid=11469 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16940 res=0 [ 293.547750] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 293.560173] audit: type=1804 audit(1569519502.756:345): pid=11463 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/118/file0" dev="sda1" ino=16940 res=1 17:38:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:23 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:23 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, 'port0\x00', 0xa9824f69d1376635, 0x10000a, 0x200, 0x7, 0xffffffff, 0xfffffffe, 0x0, 0x0, 0x1, 0xfffffffe}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) read(r0, &(0x7f0000c7c000)=""/136, 0x88) 17:38:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:23 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x101880) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000029f50)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\x00\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000e, 0x0, 0x0, 0x0, 0x10000c2, 0x1ff, 0x0, 0x3}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) read(r0, &(0x7f0000c7c000)=""/136, 0x3) 17:38:24 executing program 3: socket$inet6(0xa, 0xace76fa6ef7cd282, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 294.191030] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:24 executing program 3: sysinfo(&(0x7f0000000040)=""/22) r0 = socket$pppoe(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000002c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)={0xee8a, 0x89d, 0x3a2a, 0x8001, 0xa1}) r3 = creat(0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0x2000000000fe, 0xffffffffffffffff, 0xc) 17:38:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x22, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r5 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000140)={{{@in=@dev, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r9, &(0x7f0000000640)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r11, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$packet(r7, &(0x7f0000000640)={0x11, 0x0, r11, 0x1, 0xfffffffffffffffd, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r13, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a7e9f1f7ffff", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'syz_tun\x00', r12}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$packet(0x11, 0x3, 0x300) bind$packet(r15, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000003000)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff5c74", @ANYRES32, @ANYBLOB="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"], 0x444}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @rand_addr, @local}, &(0x7f0000000380)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r17, &(0x7f0000000640)={0x11, 0x0, r18, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r17, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r19, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002e00)=ANY=[@ANYBLOB="5400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x54}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002a80)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/106, 0x6a}], 0x1, &(0x7f0000000580)=""/112, 0x70}, 0x4}, {{&(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)=""/173, 0xad}, {&(0x7f0000000740)=""/206, 0xce}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/124, 0x7c}], 0x4, &(0x7f00000009c0)=""/76, 0x4c}, 0x9}, {{&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/74, 0x4a}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/9, 0x9}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/216, 0xd8}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/87, 0x57}], 0x8}}, {{&(0x7f0000001f40)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002100)=[{&(0x7f0000001fc0)=""/83, 0x53}, {&(0x7f0000002040)=""/130, 0x82}], 0x2, &(0x7f0000002140)=""/202, 0xca}, 0x8}, {{&(0x7f0000002240)=@can, 0x80, &(0x7f0000002480)=[{&(0x7f00000022c0)}, {&(0x7f0000002300)=""/154, 0x9a}, {&(0x7f00000023c0)=""/147, 0x93}], 0x3, &(0x7f00000024c0)}, 0x2}, {{&(0x7f0000002500)=@xdp, 0x80, &(0x7f0000002900)=[{&(0x7f0000002580)=""/126, 0x7e}, {&(0x7f0000002600)=""/74, 0x4a}, {&(0x7f00000026c0)=""/93, 0x5d}, {&(0x7f0000002740)=""/50, 0x32}, {&(0x7f0000002780)=""/71, 0x47}, {&(0x7f0000002800)=""/61, 0x3d}, {&(0x7f0000002840)=""/152, 0x98}], 0x7, &(0x7f0000002980)=""/236, 0xec}, 0x9e36}], 0x6, 0x2, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$packet(0x11, 0x3, 0x300) bind$packet(r21, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44830000240007e744c01e69dfc8a800e631e748", @ANYRES32=r22, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) r23 = socket$nl_route(0x10, 0x3, 0x0) r24 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r24, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r24, &(0x7f0000000640)={0x11, 0x0, r25, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r23, &(0x7f0000000240)={0x0, 0x1000000000000000, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a800f1ffffff", @ANYRES32=r26, @ANYBLOB="00000000ffffffff00000010080001006362710018040200040406000300000000000010ffffff9e0000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed4800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74db5c"], 0x444}}, 0x0) r27 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r28, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r27, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00$\x00'/20, @ANYRES32=0x0, @ANYBLOB="0000000000880147568e5a88"]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004000)={{{@in=@multicast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004100)=0xe8) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r29, 0x0, 0x8, &(0x7f0000004140)={0x0, @remote, @multicast2}, &(0x7f0000004180)=0xc) r30 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r30, 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xf, 0x1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv0\x00'}) 17:38:24 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x4b) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x100000003, 0x0, 0x4) 17:38:24 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:24 executing program 4: perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:24 executing program 4: perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 294.827092] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.2'. 17:38:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600), 0x106}}], 0x2, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x8, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24048005) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x1f6, {0x81, 0x8, 0x1, 0x2, 0x9, 0xaa}, 0x0, 0xff}, 0xe) 17:38:25 executing program 3: sysinfo(&(0x7f0000000040)=""/22) r0 = socket$pppoe(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000002c0)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000001c0)={0xee8a, 0x89d, 0x3a2a, 0x8001, 0xa1}) r3 = creat(0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0x2000000000fe, 0xffffffffffffffff, 0xc) 17:38:25 executing program 4: perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x160) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000080)={0x1000, &(0x7f0000000380)=""/4096}) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000001c0)=0x66b6, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x3f, 0x2000) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x1000, 0x200, 0x3f}) recvfrom$packet(r1, &(0x7f0000000200)=""/165, 0xa5, 0x80002061, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x820, 0x4) rmdir(&(0x7f00000000c0)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r3, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000180)) sendto$inet(r2, &(0x7f0000000000)='.', 0x5bd, 0x8000001, 0x0, 0x1e1) 17:38:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='v\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x369e5d84) creat(&(0x7f0000000200)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r6, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r7, 0x7, 0x10, 0x6e, 0x4}, &(0x7f0000000180)=0x18) [ 295.231615] netlink: 1056 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:25 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:25 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:25 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:25 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) semget(0x0, 0x0, 0x80) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x48181) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup2(r2, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r3, r4, 0x0, 0x4000000001000009) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup2(r5, r5) syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r6, 0xffffffffffffffff, 0x0, 0x4000000001000009) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup2(r7, r7) fcntl$getown(r7, 0x9) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r8, 0x200, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r8, 0x1, 0x101, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000000}, 0x43357d25e9359f0b) open(0x0, 0x800000, 0x66) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8000000) r9 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x300}) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000100)={0x0, 0x7ff}) mq_timedsend(r9, 0x0, 0xfffffffffffffe80, 0x4000000000800, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000100)) r11 = syz_open_pts(r10, 0x1) fcntl$setstatus(r11, 0x4, 0x102800) write(r11, &(0x7f0000000000)="d5", 0xfffffdc9) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000280)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) dup3(r11, r10, 0x0) mq_timedsend(r9, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000140)=0xdd) 17:38:25 executing program 3: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080), 0xffffffffffffff6e) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) 17:38:25 executing program 2: io_setup(0x1, &(0x7f0000000000)) lstat(0x0, &(0x7f0000000300)) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) r0 = syz_open_dev$usb(0x0, 0x0, 0x80002) openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xb6\xe4\x8d\xba\xee\b\xeb\x8e\xd8[T|i$\x88\x04\t\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000080)={0x0, [], 0x4}) sendmsg$nl_generic(r1, &(0x7f0000005880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000005840)={&(0x7f00000058c0)=ANY=[@ANYBLOB="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"], 0x2b7c}, 0x1, 0x0, 0x0, 0x8000}, 0xf6d30cf3d13b98d6) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r2, 0x0) accept4$unix(r2, &(0x7f0000000440)=@abs, &(0x7f00000001c0)=0x6e, 0x800) r3 = syz_open_procfs(0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff}, &(0x7f0000000340)=0x20) r5 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x2) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="001e0000180529b6e2a57390b852e46ab3ee4e337425f63494e372720458e7b084f670978dbbeebf66fb588f9addbd29a62ec1b5fea1e552aabb168c2736337fdef0c1cef5766cb03051691f443f332b9da40056e6ef6f193cc78cbc269d25a769b73bbdcac6afedbfa8ec0353ab026cef4f0fc0c74531cb66551525ebd7acd48bbf222ad47e9fb78e8bc093b08ad1b7a058046bc9f7064cd289ecdf2843cbe4a33c52", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff, 0x0, r7}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xfffffffffffffffe, 0xffff, 0x4, 0x80, 0x20, 0x0, 0x6, {r7, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x1000}}, 0x1, 0x2, 0x1f, 0x2, 0x471f931}}, &(0x7f0000000040)=0xb0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, 0x0) 17:38:25 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:25 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:25 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\f\xee\xc6\xcb\"I\xd0AVImG\x9e~\x01\xf0,\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xca\xcf\x13\x19\xc5I\t@\x00\x00\x00\x00\x00\x00@\x03\xee\xce2\xa3\'\xcb\xa6\xf2\xba\xc6x\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x4, 0x101100) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, &(0x7f0000000240)=0x4) socket(0x10, 0x803, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c000}, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) [ 296.065168] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #1 17:38:26 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:26 executing program 2: io_setup(0x1, &(0x7f0000000000)) lstat(0x0, &(0x7f0000000300)) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) r0 = syz_open_dev$usb(0x0, 0x0, 0x80002) openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xb6\xe4\x8d\xba\xee\b\xeb\x8e\xd8[T|i$\x88\x04\t\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000080)={0x0, [], 0x4}) sendmsg$nl_generic(r1, &(0x7f0000005880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000005840)={&(0x7f00000058c0)=ANY=[@ANYBLOB="7c2b00000000000326bd70000000000004000000bbeb9fc2b32088a402945524eef58436cad6a69eaef660759779c9f544c3ba816e877396f7e9fef97b738fd470c20f981e078f62f77c163dcc5e9a7d4bf9532abc2332b473a25e578b4b7882a99712d1c2c37ab1ce4950ebc92e2d1b1debec69bb13c9bb346d979e86a31af1a2f490123cb7441daa0307337db9dd8234827b6fbaa867f3b9da91354b29a2b37b7a7b66cac3dc534177cb5ce1e2d41046c9197765b555786dcd5e31fda4f858e838c5dee3d5b50307dcac8275b4917aed53de9503d60dff5ffea2cdc4efbecbe969d28b0c88d19cfe3cded3eec6f91361c451ace36ea39ad30019c38dae4411f1ef30a6c41a25f9613a4dc960b437bcc244961ecea49cbe572407a08c344b9e31148a22af3539ac4e4714101500bb31778d30f9474685a62f1f7afe632f4d57a56edbb6826b4bb6203e0b548b760db906112e32a7120fbcbf7b7f8bd26a0e4d672e04c15ff21b0eb3df817990c9303c70c6cacfff5f7b087b28bb12125e388ab82207ddd7aa9a9189d50dd12521f53276720bc643e255b03acd240b4ddeaebd4e84b996e7498fb3edf4763255d1ad99df32634edddc056ae36d49b3f1479c4d983cb961e0defcfccbd4e75acc75f1ca48eb14632e10246d5ec24c126fc074fb4302ce5218823a8c14baf72bc51cb220fdde8c1f48872ca18782d1547afcc1b4cb500dfad4e08832a4c21db834a617658da4b21448fc462a86ee784123d29cef868078cf3df52ebcdf9f379537afc4dd5ebf7461df34e4e10a4611a9d9f7e1128e0ec4f0cb21ce9f65552a2921482f80b01ab25e8998c6a2eaac9f01daa12f5709b591931793b5caa85e3e32ab5a0f11e2bd52f3b7e429e6e55a7d2f70f03fc7b639bc0f93bae0ea8feebfb3fb1058b3fe48f777a0e643b9981838044e3b5fc19110ef56c0960c12d46d8198adab353a08c607622efa1a527668a6447ba6bc77c80d4e813aca46c17ead297e2188e623f1b22e5c5570f139b40ff1915dd3a86e84266d48e5a97fdf16c6b506ed00f6bf24e6b649cd94e9044ff10d39a391799302d2efd2e862fe9256dd2cacc7f2698f13fc4eb1f22dc9c1f882a6f26d38aef312101a66a5c2e999081bf14e4f23329a915344678e08de978f6bacc066d4ae01bc31ad3a5bf295a832b729804c73cbe12c519c7235dd12becf0b1a454e1aa969ce797b6795455a0b39097b439e98f8545fa942c5deb5c5ca55ca0e736c58a956179614f1c2f92f78d846d1107a2b22b755e632035519610f0a09ed23e24967fe22d9fe7ae3eb9c63f8a36dc47b5bf465d3bf429769cf53cc8d54f85402bcf99d680d8867544a09ce31f8e2360eace22d3d93dd4ee0b5d3c1e93abf3bdd59139e46f88f0507f0017a0fc1e117b353061ee190ecb02b3b5abaac3ad102e49bbd4444dd7d9d935d47d7f8c623620a502a59c66621cdafeecde2ffa0911df4644001cccd5e2e8fef2a9496e0dc72675e03f6df27734877ca30485b552e600fc31e759c5fa65deac894f352869771dd18f4ace04850f6c187941d2a030ba37c0e289632394b7153bd0fb781ecc34feb6680370e808ec363db70e1f9b14a9e163a887ed4d7797fbb0d71a4698c5f4623313608158cf8f325a6da3abfeaefaa075b3eb0c61ad7fe2424b8c66534330f6b11c91719d4388813aa8d871097a54765aab3fe1b64535a2a1f9afb2bcb87a3af11cddc5abb003f4b7e30ee29ae2752274d739966f9a27008c1a062b0a9edbb4b360d11e73d7030eb4aaa999347c62f521314972fd1e7ac47374d2f272ed27fae1ad6c60b4b40ab98aeafbd3f9e0a9f08c7c8f36614e75b98f5af4b8f281eb2a6da8731b3fa29b49e8028dea488723a4610cd881d4c6f59f1f7a9460e115b1b610683435b53a974f1d3cce4e45fbf3a0256acf77fd01a3959c01aeafb56b0d396e59e3c9380eb3e9e1c7f073927df3187995a934728e734864c7579fcea009ac248d419d2193f07889aa5000f164cc61ad232f239c2c754e6bb4f0cf1e86a3b1dd33d6a02628c0cdb37e288d27f79812a157a9791943bcdce6db5c7908bdb43e05dff12a85d2a320fefe9efc5393ff3fc5867e5726eacc3397af70934fabea27e4904c97f99fdf88969d0aa6c9ecccf04b3342febe6b8531b88ada23d000b418b4778e8577168507c9b04db832082d53ba8b73fd493b295f5a17de0b521d5194bebf406874363c8116bb799864f64fc0bb979cd2a430030a4a0fb38a0859f258d4c2fae1809fd9a944cb15581e01340b71f4bc721d8f03cd138aac4ab08c2ca8b2db0735da09dca2726a31a8b8c74a437d6e76a09f1af7a2dc8b115e7169a46908a9039baba705efeb694d1ce2a4b105de0be7179797629cf1c8df787a68729df0f7e123a8ab889db7ad97910fd8ce64a466970a44dd4e0caeaee637596ce65e7aa4d881820589ea93e4eae78db2af17d68dcd4ea22dce53f8194537c257f622432607d716b62d26913b5b6f423a4c6fdbcfacbe35797221d423035df9fad38e1cecb4d03236ecbfda90fbd3ae24871ec3e45944cabcc926f16962fa70ac331e6098412fad4d3fd13268fa68fdd74fd66bf845bff2ab36b89b1ce6843730bb03219cb600b9a73eb7a4e3a8e7f67b5f139a1e35e7f00b645d2e27bd984535fc25a8de65612618489eb81f6e963b6a8cb915321168845fb35c0d7723243aa3e1b7ebf089b6432a54efb56a7559d5950e0575d12ad862a136256a7fda3e22a46ad16e0241ac423ee67fd9c01725746e18a808c06fee255c3114af665d4d0c0d023cce882fcf08f8b73fc4af1288b54c755ff423e94b1ff54deeb1eb74b997875ec3a5282aeed29296480e482a469c9ec993556249a3f39bf488eb820a69e5e5fc2993b27fc2e70647359ffca02b55921d74e5b665de23ff13c38b370a048152629ceec51eef177dddb8258055c68e6fdc08a4eeef781a7980c780a30c4a14d7ff2466b8804f4fd223dd5595c3a060f4310636748b647c3ee8f7428f1788f8ba84139b1893bd0e75032e0d6bdfff907299b6b12ccbaeac4f67a2a6861ab0b39cff3b78559a859eb0d0da17871f882a7a64ad4f78c32df64634aeef78e48db3d7fdd2c860b2bb783c4a8af07fd7f83f56afdcc61a845f3b55fc09fa861ac7b19106cb830ff649e8020eb38ed10f061456408fab3538ceea00ab93bae5fd93e269b58e0907bf84f215e529580ef8576e588d3ccf8c3fc286353f9810ddc094bf0f3cba9b4695f25f8c29bc2673231a42b45aa0802abcc4a02502e5d48633f9884be08829be47e7d3ade9b7b8762e87b7207a392aac03b10ce5d1d5d16ac8281e74921f3ebcc6063e37a01202dc024e846147daf40376c5c8c1f3f7f058f3cdab44824de2eb54cdab58eec3883e52b5ad8fc95807e45d6e69c7abf4876056409bd3910a4ef25c68fbdc20aa0ba0ef1897f3636b33ce059d20d5796bf6fe0b46c8d57d8639f5898cd5250dd9929860eaf912eb87f10e58b2b6dc9978a2ae181d2e2b8c48bb2b8baa7773e4a419592c46223e5a2bfd94788aa9ab6e0c3aa1f539aa060e3c7024fb7be94ee060fe303fd328f06f2b5f33d01226283b4f99323d2afbc929eb3f112871f16cb5195838033502c7b7357b0b24bb5e9090c91283c03f1744f12938bff9c5cd6754d784f71ef9360dabe4ac030957ed119c9b932d3fc61f15f41f51559ad653a33dd02dfba154b6d817e7817860b99222c08b941d45f834709adb8d73d65dcc0ff793f4a084495fb8c9780448b978bcbf2c79fa9232e408001cb81d16d374ec378fc184ed36e4b067ec35e92e7a76e27ca3a15d17fb03f09727ca13c41d556f54b2cf01caae7c4af9dba40ac569f5bbbe2c4058ba1159958d2676a094cb5737ba0a96d4829db89fc7e23d7576da27f9ef169b2a2419dfd31179c281881a174b7a8575834a2a1fa41eb35db53352e1c21dedcfd9e2bdf3ab26c3379c11ef585e70b32bcf712a7c819ba5e005b37063c7fd66bf9f72ffb4c619833a4571451ccd5d441f9a1189d48567c49c6e617ed3c668fb1fbd829af152fb8ba4ec6b97fb7dd23af4aa9b849e1e9c42c3ab9118111b833b4ebdee905063e392a32e177ab035bbdee70ec72788bc9f212b064a387672cef5cc1a38aa1c954040f3265c309d26a666d4f02929fa147249476410c7d05abe1d513c4d05555942871af2af34a8ae828eb68d6f567f6538721bdd8a89d617635ca327f58849b0cd47ce9f5f93055eaa81b48ebb6fbee96ed52e6b0e03252ed3be92072ad3398c20c2213fc1efc6041a89224c194cb1d3368cad9087154aecb4e67c738e80e2f52194ed533ec02816dff780683acda70696aec445e4d49634e7e965d9e79e58a80de4511b816de7d7bca17008bbb921e3203570cece0beec82b597ec19f5b33ea93a434b159ed6812a6d9f94ffd65c3f1b216ead8cc8dce23b921d436e7b67067388781d4d403198dc09c9376b113a3281b291dae42d2c940d684f17acef64ecdadb859db000ff5ddc7968ac32921e01a3134fcf62fa41daec3320a022fef39000891aa9cfef72b73889e3b5ceda1bc3d712a18835368d6cb7f0e22c3c3578af000140f8fb3d845d60ef74153ac4ee8028a354c1758d84fc48b148c46c19f77cf0626f2454e72ef6caea5438f3e1f83a16856bb5faa38c232b7cbd63a372d3d48fb009061adec849f9f73e847120acbecc0c5afb2bd347be63320503a799463243d1d5f59014c0c503f8ebde877902e108a3b59d7e5b957c6fe47dba4228b9c436ce2b708e8d547694da0dcb8ebbf0f429de15978143baf860076b3dbfde110eab4f9a2fcb824dc3ed6e4e1555154381c1d288d354537db16e4703c067675e9bcab557e9ef36f901694f61f12f4a38bb6923a26bb59d3c66ed8e7540d5e2a74dba5d621589e2b21ffe9c7eca586cdfdd542cc3d3bb51002aebed74c19ed4e05afc02458200e13ae92aa660ce9fb4c142a112b2a49c82a5b14dbdb1189fdc8d438437d6b9847e60ef62b6004a560bba3fa184d8b131d1eddad7a0fd190849368c63883595a8452e744c16e493590a68265cb06ee2aeb83f3e7fc42abdddf6bcb89249f64ff45c2931667e7af0baa387dd2096b885d6c266ad00ed185e8bbb12c4ed2ab7b1bb7abcd72402083f4e0e45ed2c00a834e2e33b1fc4fca146b39dea420e78b4498383c427f7d90defea994f7a799893f97c15e59c4283cbed8e3b9fc46007e441ea32d0f87b86488e7cfa86909f21c143c9ae227cb6003b7be6e388e1f5ad6fb7098b1f67d48c2274163121c36e280befdd65c4edb11cdfec46c0735365cc491013edeadd34b525e0d2d806620c8ddd2ab02c75485179bd0dbe04a19b1e26af62a49cdf822ab56ae4aabddd3057d30739b4c6584c23835623494a9cbbc8bb2ea8a0a3892663ba55ccf3240c0e9f04116bcc35b1e5652e4321c9d2b968279ca969203316a02df4d96582cc76e45ce60a6bdd795871e3ae43e709b11f773f8fba0c6d04b9319855250c3f84f5294a58e0b154479ee754e266abb121e2d59e3606c213aa2d3517028013665f5bb74f6873df1ccb412759fcddb48830cc934c4e8e230d3ddae9942d625366901ca86815a4629d80af40ddf9418bb636bebc5fcb9250d01d25b656c4ccca36d6d7b1c00a45f0fac484806e3fcae2522740cd130958d7712b29b15bff3135028a413426eea09e63919e582538758d483174d0176377cd60aa2ddf97b36bed57f6bf0bbfc0926400e103cd109ff53fc6520a988eb9e9911b66e557e9a14eae8f2927f1e78b8ee9f9a1ce7414d87cf4a0d47f0811e486114c061edc8bc6fde2d58a145b7bda4045ebc5e4635dde0c79410f10fb1c33a08ee93d68bb27e3f99af3c4f1c0fc1741ebde5bdf90d2966e2e55761058b17fee89f683bceafe3876bfb61a483f850c18b57a52e9acfa41c05d0a2318ee0045b8683b45fda8a6d4ed9757100eec2905d364e674ebdbd6ac8ced0e79550ad31fc75fdd5a58d342e5388f99fc23eabc070074330c3de9b3f80b80672118e5297453c974bfeb7b597b2eb47ca2a2b966a603d4ed57c86b3527edc070a24ea13b0a308bd034891adf6ec6f287cec113f2d9a7407b8226e4dfd32e51d0e0d8b5b82f779bf01f48d75932140c71e81579c09aa9c7f6e0549673c88e946e027c8dbd319ca2d7080039000500000008007f00ac1414bb884aaa62602ffe2eb9f70f3eb276a7fb601cbc628e7b77c58254568c0e5b7ebb1b172808c3433f306b02c98728af66c43c2cad3a16f1e6ec5a6eb02257477b56975dee2856fa20deb99652612b29f5e26b1fb6554bca1c2457b8c6592a0ad7e22131887422476045ef56396209ce66b8cddbe29dd97aa30a0f6955c714d331bae594745445342113874e418b7638a9a2183291b28a371ad932aed75c40210624399a25e285701c24f47a777bf3dad841891ab67a1b6e79565f93f124e3d83810247f01e2e0996b4ed88861d1d9ddef69407e3527018b66900ce8cc2f482f4167b39cef627f84f3c3667def562270e546ab4d8d52d630b0fb00c7c1507bfd94810d419a88758d5f6a89b607ac26a743b93813f1f3ee8398bcdd9605a104f86aafc34561d3ff045e55551823a440391dfd216cc2d3bf2a56fe6c1d25e19808267b6e15a8d0780fa07a5da4833190a9c114659b7927ea1b24dcbd1371ab239f4b9c017df9b1bd93b4434237d7303be017414e9239e8a292d262460acdb8f0a1e8c46134dbaec2aeeefca557f47a732676ea02f8602e2cbfc6848b6c15966de27eeaa36e3d0d10bf5eb58ce82fd8d2d26c2ff3289e410b0b02e910e1a9e630508dec95e57f54b48cfa97efcc20d1931007aef59495f7b3d012f439fa5f6261755e2433cd9a09d09e7cae400924d37c5ff7a34ce919f916dc0e9a9ef00307836298c8fd4f219af89be2b13a71138107562012bf517eb4218d1427103f74faea0a30857c46e4b159c5907673e59a6ecd153cfdceb35ae416084a44d121abb8de21ed6743800f8ed4e46e39ecc8508c7fe95144374464ac392fc468a87861e5e704554a5f0ffdd957e949ddd3cc512421cb9aabb9bedf872c3458379799c3e58bba9c3359779afd2ce1c23d641092f667566624f10f6ff19fa89b496a55794cc2ee7d0e48f121b7284d9d801bddcd40c063c4e9095ac488d72ce3b66d534159e3a9b58e617c9cc1886b50f2404944b2b597095ac7788259ce58970900449334a4c5cbec4269e9db2bd4e39a427a86d69b0b177757c5802441eb77af5d176565f58383303e72cb9f6932000214166bf6e25ca421e3b3c93c0972f142452c96f75a3f664491c1345e4e8cdbecaf72114dd8d9747004b26de63cbf569c5f3f15e29e0f7cf09abe16d9680acbb0c1c178ce28c36899b5d0d2e5be85df6f01ae19cc89146b5f86d1ccd93999994d1fb024878c2abd8e5e5103ec5defa52774d86e561d8c7b5ef11a91df8b8a89ae4fbb3e031ea9b7be9f1c4b592882e02f5b8af12aff8ed2d43a9adfe7014023f8edee860af58403e2a9c1180bd24d295a948d88f1e00bffc667020b811b8c6f26ed45837d3afaeb04209a643f545bce97fc0d0234549d5b6a8fa3264407bc543c60f4bf065b1bb0cee5a397159af1596f065811f4b819f5bae594d390e39fa004978cf0373762b27758ddb3d7aa6c1c10e4bdfc9c476f48390762077dc80309e00e66fe2a0861ee5cd927b8e72f608015e70fd473c236fea73d9ebb3e85b96d96a58313914195b2c9d9b4b72cb576a569a1c5c9fb31c08c65e9d66bca80a1371ae014302023a9262bb10486ee674ec0aa8d93aa0f92bcb039d443025cb2ed66190d0e473b6b598a4a114bffa8e7d6cf5bcffb731c250c11fa3faeab1f3d96bbccf7ac16711451d209199e461916c5a8cc714ed36d0e4bce63f2a79b70f41c2bfd26e6b2aabc7ab6b984468a37b574c307c0b12a0f37d62d457bba989020169933a88e04698bbac24d79fe94c6eda305bf91d94181f5d82af8bf065ac0633772744cd399d1577d03ff15a91daabcc7560e57d9e5d4e1edf014f3f59f3c43fb5e5c5a2870b23350ca10b289bbd5d55f0c0a25a29ba2efd34d31c6c202e4bc12fac3906de56f7ed9ad556dbdc2fc29fc68caae0be90815c5c6f13ba553215fb679b97f0dbcab57d5e26f18b212743d72e47c47770c8a6089eeb7ece562d47a433b701c9fe083e9062cb4eb41293f1b0889c55922f1e64ae84a2408272568b2b287901c47c99be08ea6c6cb12946aa41d05bd7b10799f8580b158dbe67780b2b012c87c96d56098cbd92db4f594f8609a449fd6953ccf3638d9a7d3152516c13f2213c2feb448b8ee95cd61c614c0130046f4bd9ab904f85e8ffce758e69506119cf2ae18e33705f8bad3bad8112d0d8c920601d5c479dd57436a01202a39372cee4453db571fcecdf111af5834f39711935b6a5c5dc4508fba5ab4d9cec3912a9c6cffe4a9f6be9fa132d55ed89dd51581001ca1619d89739493ea404ea69cc90100579f43206ac73c1eceee7cfe8d7bc65d777ca9031aa00fe9d11f30db774653f2e245a114eb4fe6c7dfa4cc9134fb582280f012a3b9e7ad6a52a77faef9899f2f496db4337bfdb124d9c054dbdf571c2855e543fb5c6cf38f9d36dd150bdb38e6d1ab319c49abab625d61d4decf735aa05c27a5671c4804ae70b75146e6c6b351ae1dd0a829c082ebf3d3bd0ced909af20f351bda55cae9d47c0de65257cecd3ea1d30bcd55ca67a89b2e71fd5bafdd0d418286f182d35cad7b56480549398ab9ecb37f81f49310c7b18c57e0adfb33aef57dea8ef6fc126dcb47e9550a30443bea6fc6e87e13dd3459499fbc6796ea2d4640659ecfe8986038301e3bd54889ced3b573b91a8d72a93d07ea0a6df2d759da3c73250e5bdc2f146d2abffaecd72085e82fdd53e5b1c1738df5053b845079947ee890e83980ac8ae28889a42ebee8906560907c673c1b2815a4a8ab61544e3b3275c9f841eeedca2de2b39158119c3611909bd03fdb0c41b0aa1a88ef587f5dde35912637639747bf364f220ae4763f3daa8e6e48fdf0ef9af76c4f6f8c0c73a0041a9073e58b13183b70bf7421b739d9d1fb68fb91b4e610778b705d8b484e1a73904d0623438f12af24ad6d785aa317e21ebc5c0110a20f4ea8a08ed9604e2983b6b9cd3be4ddd6a31920d00ef6adaac6a37d8cca7433e007fc55502501d5a373be460e10c48c3fdfa6cd0389984529776b978abc53384a5d2cc8674e8ba3982f50105ef874c9684122365b372a34315c42f2006c8b874960c2d18d47427de2ad7f6c0e3f669b42518630d7f1505d3d74a6308a6b560a637f5e9e262fdb8af203e90410fb265b76bb4072ad62abed7e53e0913460bcdb472b6f2e57b58919df15ab3cdf29ad2b718c2260dbe23bc4fef321e00cff423c14516a4a7a2d646752e064751cb350976e49f0f6ee9fd57927d37f184298bf4b67f31ac8dc9d779c7dd42e685b8a2eeac3258267a8435df380b6bc3cf86881a564f17e98080ed481497ffe66c10a71c7f356346f53df877e1ed1ac763bb82eb79be390aabac21d2cc8841b6e676146811a325fca228ec6d5e171c989aeb6abf3fe3c3a55aa11cb1acc1bfa3ff33737a98150a76552203b3f231923e42026a9012048ef1d6a0a2ca81fc0533f056d38d3719e6af215c931b143cb2c92494298af3afeb81d1a053790c3dc438fc9eba486299e55a728f50291feab1e7777ba382e4581293349063ce861a4613b6d64742a0606265b06783b7148bc580f0b00040093004772ccda2ef95d7dd362981e9c0abba2fb5b52a00c0c728ddf66b21648547aa1f9dc97d70478f86ccdd4c9a5c9662cb3c260be9115ebf448f3399fd5ebd45fecae1f0dd0dd15523d44bebbbb54e5e4386f6774fa4793f2559872406ce707a708ed385c89d23d7b6917196e2609c18129384a10163c87c1bcd06dd775a2babc82dbab8a50cb1a9998ef3225c9f6b27689ddd552e25431b135b37d8ab48f55c63effef7b2d84ec5f73bfe411be00170e3f275f5c576c4a78ddfd6f8f29a1b5b4d95dbc0fbbcc88dbb0e7b6b3ef76a5f46399efe1163a43cb2cdc96342725668b17a7df93e19a4ede741cf8277a179b799b8bedd281bc9367c093b27d07477eb40f298f55c29d60120613a4c2c4fdf69ca5f75cf5e51f8a34832409a1e26b4e852cb45d2b7b989c4ba110322594a0c4a75be4aa48f95551d7311a6408319a969d1abaa2347dd4945ad9ac1f93542ff1de6824c43ccda985d34f56826f0f5db99978a366a2c2ec4c956562b7aedc77f8be26d92f1a641404150d52388b98b3ff8d7c9ce6a4365e9253555822a1e680a1ae7c580023b539948894b4d0bae6c799a2395f911f1e1132282865599c7b0e8789c3875e7dd7a68609c6ef4affc47c6ada0ccde745888a084b07716966add4b84bb0f893ee7c54b6e31cca49914bf60c75187c2bb73a01c19897525399cedc3177e6de25b212ab979f52f3578a01894a8b355d08691dd87a1610cbb742dceda81a99d49064381e4b8f5557379c012e94aa65a5639ab4006ed22440c6b715c6a6c8e7b8a4831b8127c734e221b04e8d11342e9e6b052eaefd537a32283b5c6cf2bfc239d52f0af674652ad768f2944fae4f26daf19f6ac70703a6b1eea10b1a185c94d4f606aece5fda75cb14cdf630f29ab80271061edd0d71e2e11bde55ffe0b34fdc5a78b92153da468ef7f88cbbe08e5d9c65d100ca8bd2cd526f8c0ecbabd211a1d38b67b20388c09ba6c68382b68f77fce4e74f1522ef21e05d700885fd941357ddfd82104cc41b7549de0867913a275b83e3ba96ed4ed34ff01388fd6d9552eece0d0c6bb3f64c14dc082924a26f77d5595337ff0a0a5f3705168b19978ab295b960d567515713805be1e492a2817756e44b30c0f9fb770b0b2613a623f843548679d4f8cc9baeba74eddd7b52be6fc74c861e6a609ce42c0a9bc7ea06adc01c71edc2c115bde72daf2f83da2102e9518f98cc6a087b79ce9a2def8beb544683d0d6bef5fb8a27b053d10c59a04510f1ff719e4a1900eba8f0a96ebbd74d7e624a6b5c6fb53e8c46ea4c79eb9cfa6df111d74c4d7b2d8666224c277d9948b222d8337b869ddb284fc27feac765247578439678b44768ea7849823d7c40dc69a61649fc542a30415a6cf62308127a30fafb145c1463a11d3e162f5fa9160e93277e381c4f1f8202a409d7db229fa7f4e30eec1e3f93db5ca6b05716b0ae66f7d55231f9bd08d1f9a936c992f6f3a35899db42ebdeb259c97ce609b69cdd527a0a45619fe7a416c6c09d561d201c3b746e0cc07b969163ed015443c90ef2389c95795f31b509b28f3bb70c2412753c0ac9858ec63cd825899e6f8c1d2bf5bbd779b6c7b617fa5dd2b06b9b5b833550f9aa1d84d72dc720caed686897b32288feb5751bf3c6124ee30c583f367fef06ecea68791959c33071b48246b96bab5e3443211bcec1b2a504ef58b79bd6cdc023a4c143fb8289448d17f0ce990324f9f86c7ef164d78fbd34ff4540b23016f9dedbad342609c60d115c39c2f503bb62578b72b435afefaa301436a3ea3f3874aaf9f97f03a821ecd5723118a387f4b148c86f759e21c75476026c34d9cd3f2562dbbda2461cad2ab2571a3f4f8f8a06fb35975d5237a2cece125bee7147d604aefdedfff78d357865b6d426548bb66f2a427b182c2e8cdd78c90a7d676b7e6a0ef5e9b05e3cbf69ea94514225bc9d27d1c4295bf61794eca6e57f531ebfad6c11bbc5e788b0137169ded77f427e7b78a58023f27da3c875db3fdb45e3ea71924f4a3b93865362f67aeea8202a3d2db0225dd72b3b2f17aa5d20e40521db6d95b0c3dbee86d63c2c749f1c4742872b1444f37b8038f70cb1f4e0e8fd283a4834ebf8de1d3c7ed87a6525a8b4fb8a7d955b294609a4dc485254fca9b2ae92fe28546863be02b1dc761052615e218487eb96822c7406a184493c97f11be008ab6a298c5ee72ae68ab2ccc085aab11aa9a9cb7925b9f6714cee851e4d3e47620aba00f64af371b6d9bf0ce542ba988755692c2d360a4e170f381c6f8eaf48f332ab53382f9a57c00ae9842921202e15d276406127e36e670db912205ee3381860f5c1ac061439a9705d698cee35f0fb122777571c65ce2dc6d9320734f49f5fbaf0e7b1419f880e07b6772f82a454d6220d28c8aa6c499006f13132facd329f793879a7ec9d671355a148cdad02311696440f668b910580340fdce03b78cb77d825be617852adff17d79f5d4880b14ac247e96114d1e34fccbb87bd65df33eb91697fc4a36063670cb907d642631e5af1326b76843180b557e165680afd34ee45aa8f58c527f68fe511612d658b1e0401a3d6a87ec3beb9a3bfb1120138dac713888478ae4bc3bc7e5e4bbee1434102c5614673ab7fa3616009d442882cfad0fb006225ad39b37003e4ab4e8731363ca57b73c2aecebc1e1481ebf05dfbee6e3a3551fe036dff1b92bf102d60ae73c31f5b2a5909594cdc773f70c47a5f7dc700c125655714f204a52c90062e887f56cee43263c96dce15eb7f8081adea10d3413003117808a809f9f08683741f89cfc74bfca203e2b5fcfffb86c820cbc2de83a800d54e134119f19eedb3607ef646ef7da5e254f5f67675f2177aa22c6a22dd119225f49a25454547aa2fdd8f1c619bb3c757efde907a116adaebdc643e8befa1f647640a07bde1cc8182b04c846002899e0ad8fe1e0341daf14a2b8ec56738ec9bb4c6ba42963408e45ac6fdc3585d6fb2cb8252280b0fd25af5718fd5402b1ac9a932ad317fd7715c36a0a9b181bb92828f9ab3db37ba407b9d696739e2a6cf07d1aad8b546d0e141719a0e15971706ae76b8f9df4c0a17de5e6ba7117d7d2051754c7b0f259b8324b27f13e6d3302dee5b70a52b013dc29c1eb6767cb201211c62fd202ed8fe70a9a1a2dbffe24981912af4e670b6c20b11e567ad38e9c489f702b73c8b265a688774fe11c7d405fbff1d3a1c4008f223a622a800ddb137d62fe681dc03fd2ded229a3ff7028d2f05d93c923e2a2c377779a5fc102e9699155bb3f557f1e51b5a3787ed0d7ad4d0fe0881d96a8a3cccbdadbcfa7bc35d85c1eb175c86fe36dbe0373acadcd887ae224daf86aa090e52bbc64a39fae854c1dc33552ce5ba35c516a99d588fe9c67397904ddab26388613dd96633d598f62c4aea48b79143c0491b6ee128886b3a857d7885946992580682f343a975d629209c7f5cc27bb65daa55d6bfa2adaad7dec493fdf4f0dc6f2f70c6acdf79e3e2d393529b9524162fe6e810244fecb3212d74e4ca30b93f4359ea60069d904a3a179a809598f4020276d3397194da705844efe2015b04180365ca2d02d37bd8c8952a6056312d21e6358329d4aa2856ab956a3af8544ff1ef7dad6ecf842fca44bd321652453b47231dbefbeec586e0f6e295b85f95aa53f1e1a2225853b0ebfe7cd1d356951a837cdaba710d3af1c2b3db2aa33f0d53fc7329f25bda6635feb5984047424aacf04f56fceba4d9565b840889342333bd60cc9f9f018501961bd86869def458e26f4454e2c08ab2b8359b80cb55c247d694849b3a65996feeefa42721323e3fd600c661eadcba406ccd3399d26801afeb87c530054a484e78edd5f1a86dc5ab2570b4e08ba6665691fb9f745623ed4f705cd0706185798b88cf5af134458ea3e5000f249b5bfb15b2286141c611388e77400c1a5431a419a558ee7896642f7d6b29b486897dac15ba4e09f58486d0fc5d2e5ea8d2a1e04b27da57cdb2cc37198227ef5f264f11ab841213c64f5d0b39b5f1092f2fa3629bfd6fa57fda986f9b21d1ae5a681621691b85f1f97bee0e73d623769f80dc190e18a2f98a0a11241b115129604b8c7ad169c22ebb727dd98074d927c7d0a2e8b408ecf599643c297a25a27b27d627ef927c6aebd770ebb75ee21e3b02019fbb057616bb5c6be2b148450d6f65d275307648769ec775d1b9e849e55282283515b529c18f10cc2795e76a204ddbd9a3a2d7383e616d81f547770eaed1f1baf2da3cef8828e95e9fda7e9231a5ebde43ae02f7c354d869b9daf7353e069218de0570ecdc48fec022d4b345d5ea61f113d451c47c37b20b93591f59da58244c365d26f99d229c481f1cf4128c1547b8f6f1ccfe4808ccb17cfdf158c681dac02deca2f5be2aae46e4f5ff3bb867dc68a1383d0b55b49561dbf473b4243678876bea9c41e31a1b5ad2203b94bc59f9c954864164c33863c40366730d00ced7cf1b10aa9cad8061d1c4c214c798f6e6c3be676e95fecf8a51c3d2d4ce16831e4a2f7aa07e7be6bcabc680d2e25ef9f6740fdaacc829f1e6ffaaef0545b83662c1acdc6574fe0ede0eb81b66d9993c4f6dcc0f6b11adc91844f05b524736c0eddd5fa539f311a7ca4b754e2ae75302b4b145a492728a08f33e21e6b11217cce05177b39df19ceb760aa7f9b1f7fca0f16ed31f723d1f751a66c2d2bf3b0a05f0ac39624c3f9a6ddf1fd13e7f8f0dbbe4cbb38cee22981178c0356e8c50e2fc77cd32817a9b59393c124020e3f168ea1d35bc439fca5700f0c07e736c3f47d2bc0e0cbadd95face4bfa91595f9d69aac0f63481a4eb4bd89fa22ace7d6af2642b9ba9a0ad1cbc90ea30fc1de99bfd60f526e0c695bcaf73cfbeddfe7706d1c72589255a64de3a7ea923c15ff3a57c70ec346b9895256f7462abb93956f658fe7ad28d1df24fc1b4fcf724c600566f1982ee3b7e4627a3b9815be839903f00610cf15581175806472d546e6a80f4c35e9714cdf221a3dee817b603d43048235604546d4a1ba82de673d6f06a2bbe827c9f5581eefb138f636047c49043974a7ec82683884833cd304242fca93ce088e6df934f109b8ba007efd567484d2d61ff76d6a5f07c764b8270179ab301bef6cedaba7b34793ef031a2f6ec385522f8fa03fc3a2c2f7b1255c0139431b8412aa9c3d0e35e7e5accacdadf53b0b23af68ef7f6535b7b410de720bebe1fe1097f391d218c769ef6248842672ded75af1dd721231282bc54e75ebab4b3dc3a306dae30c6c16266ba93cfdf8517351418dcf5f7581e07da79408bce34cbf5ce125052c8cf59cf82b5872578ff5e98d4012547e89dffe61af3a8048b461efd012835e724ca58c41616279099f12643399678e1a8c68f6d709d8a9b936914ebb46ae061462cc6faa09b00fac40d63bd1d2291b0c80cba933f875505000d729eeb19e452dffa949d7ae80dfd10c888d8836292f651a9833e804b20e88a29212c77447ec67181202132ad8b78362100af786702aed32ecea62d7e5b250bfac2adcfa2a97ef940e4326c7b108cbc20ab8c5e3e918109a2c57541e5fa0172d957197bbba1efd511afddf7a1f4cb0c76014c3fd695a917f0ee46f50494ae4ee8a0ff37932397960857d9032c49d1650df5ff97405bf40e37cbca57f8a077036623902ec2198df32a1d0a51c69918ddbd69517489c75facf81865f87a5b650080d12ed2b5d5ac6653fddec3f13dcd4ed00d28d0fa8a77397bf00d0247f10412125366001639ceff1c24f8d0fb3ff03a3a8783675ec7fe2e01c8ebc53dc7184a2dc3ff6b3b604dfcc435f9a62c8f95def9a3cd69f864d20808c6f12beeb0f6d5b3ecfd0e6e615083f408ae81a1fba8d7bef1f4c367cdaabae6b7430f8fb94a2601ddc6a2e66dd7e40c44dd271413891a7ad7321dd9ce6ae45a2958e632bfeacc1c73178df99ca56af288c937644367da942acf43713acfc7be189a693874dc3bd09033761d9079577d9e8443b8e2"], 0x2b7c}, 0x1, 0x0, 0x0, 0x8000}, 0xf6d30cf3d13b98d6) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r2, 0x0) accept4$unix(r2, &(0x7f0000000440)=@abs, &(0x7f00000001c0)=0x6e, 0x800) r3 = syz_open_procfs(0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff}, &(0x7f0000000340)=0x20) r5 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x2) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="001e0000180529b6e2a57390b852e46ab3ee4e337425f63494e372720458e7b084f670978dbbeebf66fb588f9addbd29a62ec1b5fea1e552aabb168c2736337fdef0c1cef5766cb03051691f443f332b9da40056e6ef6f193cc78cbc269d25a769b73bbdcac6afedbfa8ec0353ab026cef4f0fc0c74531cb66551525ebd7acd48bbf222ad47e9fb78e8bc093b08ad1b7a058046bc9f7064cd289ecdf2843cbe4a33c52", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff, 0x0, r7}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xfffffffffffffffe, 0xffff, 0x4, 0x80, 0x20, 0x0, 0x6, {r7, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x1000}}, 0x1, 0x2, 0x1f, 0x2, 0x471f931}}, &(0x7f0000000040)=0xb0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, 0x0) 17:38:26 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:26 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:26 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:26 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:26 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\f\xee\xc6\xcb\"I\xd0AVImG\x9e~\x01\xf0,\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xca\xcf\x13\x19\xc5I\t@\x00\x00\x00\x00\x00\x00@\x03\xee\xce2\xa3\'\xcb\xa6\xf2\xba\xc6x\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x4, 0x101100) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x1, &(0x7f0000000240)=0x4) socket(0x10, 0x803, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f00000003c0)={0x0, 0x0, @ioapic}) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4c000}, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) [ 296.707302] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #1 17:38:26 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:26 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:26 executing program 2: io_setup(0x1, &(0x7f0000000000)) lstat(0x0, &(0x7f0000000300)) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) r0 = syz_open_dev$usb(0x0, 0x0, 0x80002) openat$cgroup_ro(r0, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W_\xb6\xe4\x8d\xba\xee\b\xeb\x8e\xd8[T|i$\x88\x04\t\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000080)={0x0, [], 0x4}) sendmsg$nl_generic(r1, &(0x7f0000005880)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x600}, 0xc, &(0x7f0000005840)={&(0x7f00000058c0)=ANY=[@ANYBLOB="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"], 0x2b7c}, 0x1, 0x0, 0x0, 0x8000}, 0xf6d30cf3d13b98d6) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r2, 0x0) accept4$unix(r2, &(0x7f0000000440)=@abs, &(0x7f00000001c0)=0x6e, 0x800) r3 = syz_open_procfs(0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff}, &(0x7f0000000340)=0x20) r5 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x2) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="001e0000180529b6e2a57390b852e46ab3ee4e337425f63494e372720458e7b084f670978dbbeebf66fb588f9addbd29a62ec1b5fea1e552aabb168c2736337fdef0c1cef5766cb03051691f443f332b9da40056e6ef6f193cc78cbc269d25a769b73bbdcac6afedbfa8ec0353ab026cef4f0fc0c74531cb66551525ebd7acd48bbf222ad47e9fb78e8bc093b08ad1b7a058046bc9f7064cd289ecdf2843cbe4a33c52", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x8, 0x4, 0x0, 0x3, 0x10000, 0x3, 0xfff, 0x0, r7}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000100)={0x0, 0xfffffffffffffffe, 0xffff, 0x4, 0x80, 0x20, 0x0, 0x6, {r7, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x1000}}, 0x1, 0x2, 0x1f, 0x2, 0x471f931}}, &(0x7f0000000040)=0xb0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, 0x0) 17:38:26 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:27 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) mlock(&(0x7f0000ff3000/0xd000)=nil, 0xd000) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff6000/0x2000)=nil, 0x2000}, 0x4}) 17:38:27 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:27 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'gre0\x00', 0x200}) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x2a35, 0x80) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_newrule={0x58, 0x20, 0x500, 0x70bd25, 0x25dfdbff, {0x2, 0x14, 0x194, 0xf7, 0x6, 0x0, 0x0, 0x3, 0x2}, [@FRA_GENERIC_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e23, 0x4e20}}, @FRA_FLOW={0x8, 0xb, 0x1}, @FRA_FLOW={0x8, 0xb, 0x7f}, @FRA_FLOW={0x8, 0xb, 0x9}, @FRA_FLOW={0x8, 0xb, 0x9}, @FRA_GENERIC_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e24, 0x4e23}}, @FRA_DST={0x8, 0x1, @rand_addr=0x362}]}, 0x58}, 0x1, 0x0, 0x0, 0x4880}, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'gre0\x00'}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='team_slave_0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 297.289559] usb usb5: usbfs: interface 0 claimed by hub while 'syz-executor.2' sets config #1 17:38:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa01597867bf857ea) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000fa78c6e4410b4b460bb58f279026a62b000000001c0012000c00010069706970000000000c0002000800140000000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv4_delrule={0x54, 0x21, 0x80, 0x70bd2c, 0x25dfdbfe, {0x2, 0x14, 0x80, 0x1, 0x4, 0x0, 0x0, 0xd, 0x2}, [@FRA_FLOW={0x8, 0xb, 0x1}, @FRA_DST={0x8, 0x1, @local}, @FRA_SRC={0x8, 0x2, @loopback}, @FRA_FLOW={0x8, 0xb, 0xfffffeff}, @FRA_GENERIC_POLICY=@FRA_OIFNAME={0x14, 0x11, 'veth0_to_bridge\x00'}]}, 0x54}}, 0x1) 17:38:27 executing program 2: fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0xf0, &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001500)=ANY=[], 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x4, 0x20000800, 0x2000, 0xfffffffffffffffe, 0x0, 0x0, 0x100, 0x0, 0x3}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 17:38:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) keyctl$session_to_parent(0x12) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x4e21, 0x80000001, @rand_addr="f2561c0a5f8fee0a12267097d3688832", 0x2}, 0x1c) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) poll(&(0x7f0000000080)=[{r2, 0x80}, {r3, 0xcdb48d4e8d94ee98}, {r4, 0x80}], 0x3, 0x4) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r7, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x203, r0) ioctl$HDIO_GETGEO(r8, 0x301, &(0x7f0000000380)) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0xffffffffffffff6d, 0x0, 0x0, 0x0, 0xfffffffffffffe05}, 0x0) readv(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000280)=""/180, 0xb4}], 0x2) 17:38:27 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:27 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:27 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x7fffffa7) r3 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r3, 0x541d) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 297.710353] kauditd_printk_skb: 11 callbacks suppressed [ 297.710367] audit: type=1800 audit(1569519507.576:357): pid=11741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16982 res=0 17:38:27 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 297.809975] audit: type=1804 audit(1569519507.576:358): pid=11741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/126/file0" dev="sda1" ino=16982 res=1 17:38:27 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:27 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 297.916316] audit: type=1804 audit(1569519507.586:359): pid=11741 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/126/file0" dev="sda1" ino=16982 res=1 17:38:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) exit_group(0x1) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3, 0x0, 0xffffffffffffffff, 0x0, [], r2}, 0x3c) 17:38:27 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/eev/zero\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040), 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa0320, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r0) 17:38:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c0045006, &(0x7f0000000940)=0x7b) read$char_usb(r2, &(0x7f00000003c0)=""/100, 0x64) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='{nodev\x00'], &(0x7f0000000380)=[&(0x7f0000000100)='eth1{\x00', &(0x7f0000000180)='mem\x00\x00\x00\x00\x00\x00\a\x13', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/selinux/avc/cache_stats\x00', &(0x7f0000000340)='/selinux/avc/cache_stats\x00']) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000580)={0x0, 0x8}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000600)={r5, 0xe55}, 0x8) [ 298.072181] audit: type=1800 audit(1569519507.946:360): pid=11755 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16561 res=0 17:38:28 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 298.162715] audit: type=1804 audit(1569519507.976:361): pid=11755 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/127/file0" dev="sda1" ino=16561 res=1 17:38:28 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 298.303969] audit: type=1804 audit(1569519507.976:362): pid=11755 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/127/file0" dev="sda1" ino=16561 res=1 17:38:28 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) io_setup(0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000b00)) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000004c0)=""/4096) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r2, 0x0, 0x40d09) 17:38:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) socket$bt_cmtp(0x1f, 0x3, 0x5) dup(0xffffffffffffffff) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/146, &(0x7f0000000100)=0x92) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x1, 0x4, 0x200) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40485404, 0x0) semget(0x1, 0x4, 0x200) semctl$IPC_RMID(0x0, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) semget(0x1, 0x0, 0x200) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) sendmsg$nl_crypto(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r5 = semget$private(0x0, 0xd, 0x0) semop(r5, &(0x7f0000000100), 0x2d) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r5, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) semget(0x1, 0x0, 0x0) 17:38:28 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:28 executing program 1: io_setup(0x4, &(0x7f0000000300)=0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, 0x0}]) [ 298.724239] audit: type=1804 audit(1569519508.596:363): pid=11790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir771347988/syzkaller.jvILOC/148/bus" dev="sda1" ino=16721 res=1 17:38:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) socket$bt_cmtp(0x1f, 0x3, 0x5) dup(0xffffffffffffffff) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/146, &(0x7f0000000100)=0x92) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x1, 0x4, 0x200) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40485404, 0x0) semget(0x1, 0x4, 0x200) semctl$IPC_RMID(0x0, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) semget(0x1, 0x0, 0x200) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) sendmsg$nl_crypto(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r5 = semget$private(0x0, 0xd, 0x0) semop(r5, &(0x7f0000000100), 0x2d) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r5, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) semget(0x1, 0x0, 0x0) [ 298.829523] audit: type=1800 audit(1569519508.646:364): pid=11794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16536 res=0 [ 298.870452] audit: type=1804 audit(1569519508.656:365): pid=11794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/128/file0" dev="sda1" ino=16536 res=1 [ 299.006580] audit: type=1804 audit(1569519508.666:366): pid=11794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/128/file0" dev="sda1" ino=16536 res=1 17:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) socket$bt_cmtp(0x1f, 0x3, 0x5) dup(0xffffffffffffffff) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000003c0)=""/146, &(0x7f0000000100)=0x92) r1 = dup(0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, 0x0) shmctl$IPC_RMID(0x0, 0x0) semget(0x1, 0x4, 0x200) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40485404, 0x0) semget(0x1, 0x4, 0x200) semctl$IPC_RMID(0x0, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000800)}) semget(0x1, 0x0, 0x200) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) sendmsg$nl_crypto(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r5 = semget$private(0x0, 0xd, 0x0) semop(r5, &(0x7f0000000100), 0x2d) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)) semctl$IPC_RMID(r5, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x3, 0x0) semget(0x1, 0x0, 0x0) 17:38:29 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7fffffff, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000580)={0x9, 0x108, 0xfa00, {r2, 0x87, "2fdf15", "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"}}, 0x110) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) ioctl(r0, 0x200001000008912, &(0x7f0000000040)="00000000000000000000004fa9994e127513c4969616dbf930a9efa8c00e4fdc7da1a882941bdbc267a9f027fb39f6bc8e2cfb14d0e35cb72a36c1a74926e5a4c8d7b3eee6b2dd651fb94825c04f207caeddf6a3993f36a617d26d7a782ebac55b00e145627e63fd7dedb501dffb5bd37e027c06171f5986d7dc778fc1e9e17999c36b8ec828b37cff97aa61011d223792c0b9dd330d13e00ad07bb3ba565f7c61daafc5b918ff59e59617e1d6a21aa1b8bf266d62c68c2fc954b4cf9785c4e643f22b658ca56fb5b52eb57ded4b1dac8519aa182bb593ffaed7e0b343cd2c18a3e795c6") syz_mount_image$reiserfs(&(0x7f00000002c0)='reiserfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="7265710c002174c3b9fa4ca909"]) 17:38:29 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:29 executing program 0: ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000980)='/dev/rtc0\x00', 0x501000, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000003800)={0x0, 0x1, {0x9, 0x20, 0x13, 0x4, 0x9, 0x4612a380, 0x2, 0x163, 0x8000000000000002}}) perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x182) r2 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) recvmmsg(r3, &(0x7f0000003640)=[{{&(0x7f0000000180)=@l2, 0x5c, &(0x7f0000000280)=[{&(0x7f0000000200)=""/93, 0x5d}, {&(0x7f0000000100)=""/41, 0xfffffffffffffffd}], 0x2, &(0x7f0000000380)=""/179, 0xb3}, 0x8001}, {{&(0x7f00000002c0)=@ll, 0x80, &(0x7f0000003980)=[{&(0x7f00000004c0)=""/216, 0xd8}, {&(0x7f00000005c0)=""/11, 0xb}, {&(0x7f0000000600)=""/103, 0x67}], 0x3, &(0x7f00000006c0)=""/173, 0xad}, 0x4}, {{&(0x7f0000000780)=@can, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/149, 0x95}, {&(0x7f00000008c0)=""/65, 0x41}, {&(0x7f0000000940)=""/13, 0xd}, {&(0x7f0000000980), 0x3c2}], 0x4, &(0x7f0000000a00)=""/191, 0xbf}, 0x2}, {{&(0x7f0000000ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b40)=""/176, 0xb0}], 0x1, &(0x7f0000000c40)=""/212, 0xd4}, 0x8}, {{&(0x7f0000000d40)=@l2, 0x80, &(0x7f00000039c0)=[{&(0x7f0000000dc0)=""/116, 0x74}, {&(0x7f0000000e40)=""/4096, 0xfffffffffffffe70}], 0x2, &(0x7f0000001e80)=""/161, 0x76}, 0xff}, {{&(0x7f0000001f40)=@tipc=@id, 0x80, &(0x7f0000003540), 0x9, &(0x7f0000003600)=""/34, 0x22}, 0x4}], 0x6, 0x2ef83332e5e1a498, &(0x7f00000037c0)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000680), 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[0x8, 0xcb51, 0x80000001]}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001fc0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000087000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) inotify_init1(0x80000) creat(&(0x7f0000000000)='./bus\x00', 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000003880)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f0000003940)={&(0x7f0000003840), 0xc, &(0x7f0000003900)={&(0x7f00000038c0)={0x24, r6, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendfile(r1, r1, 0x0, 0x24000000) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3a8, 0x0) 17:38:29 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:29 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000280)={0x6, 0x1, {0x1, 0x3, 0x0, 0x3, 0x7}}) ftruncate(r0, 0x10001) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r4}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r4, 0xf}}, 0x10) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, 0x0) madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x20000000000009) fallocate(r1, 0x0, 0x0, 0xe439) clock_gettime(0x0, &(0x7f0000005b00)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x1}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r5, 0x6, 0x3, &(0x7f0000000040)=0x5, 0x4) 17:38:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x200, 0x0, 0x3, 0x2, 0x20, 0x7}, 0x20) r3 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r3, &(0x7f000001b000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="5fe729bb41dd7f28f347e00bcec922bef2bc347e0e68054097df75a6d2d1149f16"}, {&(0x7f0000000240)="7ed360f498556815828f7e8112f6723d5cec2371a2956779ee7b4ca8640a908edb3f6f1765474cdfb26cd0a9a94427fce4679065af929a39b2b3e02a7d6ad069a1b249f00ea159c45e374819fbf520ed7a6b4e895089a1b9b482d0f3cdba1a8101872d40f710e8a27f155197f3044c4e662497b61d9817c6828a941b7a5fb994280767d0d247f9435f514caf342998ff8d1dcd4ea6cdb27b6b732692d5"}], 0x1, 0x0, 0xfd5a}, 0x8800) 17:38:29 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x18000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000100)=@get={0x1, &(0x7f0000000080)=""/115, 0x3f}) write$input_event(r0, &(0x7f0000000140)={{0x0, 0x7530}, 0x17, 0x7ff, 0xe7}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x200000) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f00000001c0)=0x3) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0xd194, @remote, 0x9}}, 0x9, 0x401, 0x4, 0xfffff353, 0x3}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000300)={r4, 0x1}, 0x8) r5 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8994f77caba621e2) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000380)=0x8, &(0x7f00000003c0)=0x4) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x101001, 0x0) write$P9_RFSYNC(r6, &(0x7f0000000440)={0x7, 0x33, 0x2}, 0x7) rename(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x62000, 0x0) getsockname$tipc(r7, &(0x7f0000000540), &(0x7f0000000580)=0x10) ioctl$CAPI_NCCI_GETUNIT(r6, 0x80044327, &(0x7f00000005c0)=0xf8000000) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000600)={0xae, 0x3, "abd1910cdf007ead0ead21f3f2637b33d165434aa9f0b0fa8c52ca5201762fb1b560e53c87b83027878fedde68572126acfa2b2300a07a2004ce6a33003e7257c2c24450dad4a8ec565efe95879eaf7445c699e34f7ba9159479174b8d9add29a09f3708ed251128e1a19c6569bd1cc975fe506d5ca3e40ab0d77f7bfb328af1c97808afee2cedf620bffec4587c5944a4072667a9d59c06e0eb2aee1c94725b74ca5fd4ab5d"}, 0x20000) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/hwrng\x00', 0x10d100, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r8, 0x28, &(0x7f0000000700)}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000780)={{0xa, 0x4e23, 0xda7a, @mcast1, 0xf10}, {0xa, 0x4e24, 0x1000, @dev={0xfe, 0x80, [], 0x10}, 0x1}, 0x312e, [0x4, 0xe4, 0x1000, 0x101, 0x8, 0xfffffffe, 0x9, 0x7]}, 0x5c) r9 = syz_open_dev$vivid(&(0x7f0000000800)='/dev/video#\x00', 0x3, 0x2) syncfs(r9) socket$inet_smc(0x2b, 0x1, 0x0) r10 = syz_open_dev$sndpcmc(&(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', 0x1, 0x10000) ioctl$KVM_TPR_ACCESS_REPORTING(r10, 0xc028ae92, &(0x7f0000000880)={0x9, 0x7}) r11 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r11, 0x0, 0x480, &(0x7f00000008c0), &(0x7f0000000900)=0x40) 17:38:29 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:29 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x37, "c942a5ef0f949d1307d8ff893e872b9d9ada64955c4248407589258a61dd755098367cc97ae063be7aa81121d7ee2ff97442db4826eb8f"}, &(0x7f0000000140)=0x3f) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={r2, 0xffffffff}, &(0x7f0000000280)=0x8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0x20071026}, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x220, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e27, @local}, 0x10) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, &(0x7f0000000380)) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 17:38:29 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000300)='oom_score\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000}, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0xa) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r2, 0x6, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), 0x4) sendto$inet(r2, 0x0, 0x0, 0x24054095, &(0x7f0000001180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) sendto$inet(r2, &(0x7f0000000000)="3b21947e8c66d9c759387578895cce8d0590411a93b34226a65e13906d420ccaaa47d3344a6bf4f55bf6c07a343cdf47e86e2a4e20ff0300000000000020efe46e8edb99b68adfe8b3c2263d6742914d06c951d658fd580ddb79be6cc3469d5f875ee91dcf", 0x65, 0x5dc, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x25, 0x8, &(0x7f0000000840)=[{&(0x7f0000000340)="76ce0828adb8e9f9714126bd80ebcba91f64a564dc7675d9b892e3029471efabe6bafeac4af2918fde4db94e83aca2886287ef70d05893cb26c65fcc4ff78e7887f832af1feffc20990b671a8eb3f226da9928c60fcb60", 0x57, 0x2}, {&(0x7f00000003c0)="7a8025176d7dae91836df111219838e60e6bbb1f38d25d5cc77fc271a99f24c9de22cdd93aab190ffd5681cac8b0208cc85aa3d6881d9ff3ecbb3907163eed029635ee059e1907b5bac95757e4327f38c34d9a1b03de76fbc8a5f7ab339f5078476073b766f085b425a8e4c5", 0x6c, 0x401}, {&(0x7f0000000580)="a580eb0909051dbf68784572d57907a328ac15bcdad371d53b56c079c776df66c6062a01fc7e3c4271d4250d4e9936e7f06aaf2ff4a03e9fc24286cfae5735c78bbb6cfd373ef56cdb70b3bbb00b4c0a91ecffda7228a19db89cba2c496c307d4812c7", 0x63, 0x6}, {&(0x7f00000002c0)}, {&(0x7f0000000600)="cff1393d562b04e11aa89db85b3696104d0f6fdf1039465c5c6cda74717fae493621a346bbf04d74f73a1b45195389e26b30e685e799c553bda3a74140d0ef2081da3ebbf5ad08311014f957b6f166ad839a2767011c93f53599302f6c55f54bd56d4fd31b384d5f73c5c1d9ddf7ac134daedb55263d7edd66fa762f08bdcc9ca9994ef557ef394291e6e4e43c239d9232e59b0cbbc6f5f40e94136c0f0616696b2c32c2c8490bf476e7c9073e94f3b355a0915ffd7ae317e7a284d6f2a55322326bc7199122a0b838533132d2645c3196ea31d7b4359063894d18282093aef5efb971d759115c0f517925bf369897fc6664f1da", 0xf4, 0x10000}, {&(0x7f0000000700)="877bae0b67d998538ec5b5454eb05ba2e3764c49bb4f", 0x16, 0xe5fe}, {&(0x7f0000000740)="5e43c83709e12136f6c6482815fad816e38ac0abfb5cd89ef2e1e6e7e602001700d4d4fcc0c4d2a0e849ff602c0ac92f40c07914a66481547957289f8d8150e9a1869c7fbbc073683721a927bf0ac9941c05163623702da8e7b8ccee45e6f14b755ba5d1", 0x64, 0xfffffffffffffff7}, {&(0x7f00000007c0)="66324f418f2af870191067018f5d0b6f08b1bd76cfb7a12f3c1cd784771680d6eeb6439824b65c58e76bcade88f8f60c1db70dddaefb691069e9b7e2ad6350abf01ef1f584ca1dfa10bfc5c4c1f1307fb4a5ea3955e2e5bc92159db95acc41191954ca83382fe0f8c277f41979d554c34e9ec7dac0", 0x75, 0xff}], 0x1000, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c655f756d61736b3d30303030303030303030303030303030303030303031312c6469725f756d61736b3d30303030303030303030303030303030303137373737372c63726561746f723de1fb79b02c73657373696f6e3d3078303030303030303030303030303030392c71756965742c73657373696f6e3d3078303030303030303030303030303033352c696f636861727365743d69736f383835392d362c66696c655f756d61736b3d30303030303030303030303030303030303030303737372c7569643d", @ANYRESHEX=r3, @ANYBLOB="2c747970653dcca25a5e2c686173682c7375626a5f757365723d2bfe2c7365636c6162656c2c736d61636b6673666c6fef723d6e6264002c00"]) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, r5, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 17:38:29 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 299.673690] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 17:38:29 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 299.771829] net_ratelimit: 18 callbacks suppressed [ 299.771837] protocol 88fb is buggy, dev hsr_slave_0 [ 299.781942] protocol 88fb is buggy, dev hsr_slave_1 17:38:29 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x20000004e20, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x2a, &(0x7f0000000180)="0da337e9210558400927341716eaae8fadd1bcd13b46c4d780ba97ed49abe7f6d15b11bcf9745210626460e0181d68f9", 0x30) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000540)=0x282, 0xfff3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4241, 0x11) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000080)={0x8, [0x6, 0x6, 0xbc8, 0x6, 0x4, 0x5, 0x57e, 0x1000]}, &(0x7f0000000140)=0x14) r4 = dup2(r1, r1) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c}, 0x1c}}, 0x8000) close(r1) [ 299.851833] protocol 88fb is buggy, dev hsr_slave_0 [ 299.858637] protocol 88fb is buggy, dev hsr_slave_1 17:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80}, 0x0, 0xb, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x1) wait4(r0, 0x0, 0x80000000, &(0x7f0000000100)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x1, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000280)={0x8, 0x0, 0x4, 0x100, {0x0, 0x2710}, {0x5, 0x2, 0x0, 0xf, 0x20, 0x70, "e7a302b2"}, 0x8, 0x3, @planes=&(0x7f0000000240)={0x7fff, 0xfffffff7, @userptr=0x41b6, 0x5}, 0x4}) fcntl$setown(0xffffffffffffffff, 0x8, r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) sendfile(r3, r4, &(0x7f0000000040), 0x6) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') preadv(r5, &(0x7f0000000480), 0x10000000000000fc, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 299.931921] protocol 88fb is buggy, dev hsr_slave_0 [ 299.937244] protocol 88fb is buggy, dev hsr_slave_1 17:38:29 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(0x0) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:29 executing program 3: r0 = inotify_init1(0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/unix\x00') write$P9_RRENAMEAT(r1, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000180)=0x13b, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x9) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext={0x0, 0x1002}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010f02000270f7f8", 0x16}], 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 17:38:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000140)={0x0, @aes128}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffb, &(0x7f0000000100)='.dead\x00', 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000272000)) getdents64(r5, &(0x7f0000000000)=""/60, 0x3c) 17:38:30 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@delneigh={0x30, 0x1d, 0x1, 0x0, 0x0, {}, [@NDA_DST_IPV6={0x14, 0x1, @ipv4={[], [], @dev}}]}, 0x30}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r4}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="89101eb101ff5b0bdfdd79d6883800f40000", @ANYRES32=r4, @ANYBLOB="f6ff2c2200000800ffff0f0004000a0004000a0004000a0004000a0004000a00"], 0x38}, 0x1, 0x0, 0x0, 0x4000800}, 0x40200c4) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000), 0x2) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(0x0) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:30 executing program 1: r0 = request_key(&(0x7f00000018c0)='id_resolver\x00', 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000001980)={r0, 0x0, 0xf6}, 0xfffffffffffffffd, 0x0, &(0x7f0000001ac0)=""/246) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x7ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) bind$llc(r1, &(0x7f0000000140)={0x1a, 0x303, 0x81, 0x3, 0x40, 0x7f, @dev={[], 0x18}}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, 0x0, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000002, 0x400002172, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x478a, 0x3f}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4000, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r9, @ANYBLOB="400002003c00010024000100757365725f6c696e6b626c65640000000000000000000000000008000300060000000400040008000600000000000000", @ANYRES32=r10], 0x5c}}, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r11, 0x0) getsockopt$inet6_mreq(r11, 0x29, 0x14, &(0x7f0000000200)={@initdev, 0x0}, &(0x7f0000000240)=0x14) accept$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xa97) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@bridge_getneigh={0x28, 0x1e, 0x201, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r14}]}, 0x28}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f00000008c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="08020000a7450401da1098a8ba84ff326fd05f9a885cce25a041613e54e482096270b03b0787a184ae40676b1cdeb410f534dbc2a79055c57771", @ANYRES16=r8, @ANYBLOB="020025bd7000fcdbdf250200000008000100", @ANYRES32=r12, @ANYBLOB="ec01020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005c7c000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f70696e670000000000000875b6320d80c3284a99237500000000000000000000000000080000b9c49429539d1d231416dadfb005e99df6ba41b4f2395ec56738f2f7363a", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000035000400010000007c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c00040000005c080900000001016480010400001f001408050000007f00b682080000005cf999051f00000000010700ff0700000500067f03000000018001c65207000040000505070000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14], 0x208}, 0x1, 0x0, 0x0, 0x800}, 0x40020) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, 0x0) mmap(&(0x7f00008da000/0x1000)=nil, 0x1000, 0x0, 0xb4972, 0xffffffffffffffff, 0x0) r15 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x10040000) setgroups(0x0, &(0x7f0000000480)) fcntl$setstatus(r15, 0x4, 0x46000) io_setup(0x2344, &(0x7f0000000100)=0x0) io_submit(r16, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r15, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 300.314833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65281 sclass=netlink_route_socket pig=11900 comm=syz-executor.2 17:38:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="b9c8f8b0f438bb73cc00000024000705000020000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006e6574656d0000004c0002000000000000000000000000000000000000000000000000000c00080000000000000000002400060000000000000000000c000b0000000000000000000c0003000000000000000000000001006874620000000200000005000000000007030500000000007eff02000300000000000000000000000000000000000000000005000000000000000500000000000000020003000000000000000000000000000000000000000000050000000000000002000300"/224], 0x3}}, 0x0) 17:38:30 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a80)=ANY=[@ANYBLOB="4404007dbb1556b95e11a30000009d0000000000780b98276f3c8fdb267e095ce6bbd928a26327edf35b83be9ba874687b5df3cfb859d61268348e54fb106b0d54a863a8edf709f081e6d621b9abf18a26ee455a518a0d076e3c25d9daa43fb23943ce3e2258a59565a8db36a520fb9fdb1f67949e0facf0890f7560364ce0a0fc6808500ed72d9653d854368518ddf6e286aaa0f1782cee677af1c1d27227b556ec81dd078096e114ae9c511c51d1038d321a67c3ae30099b1c48373fb4e1ce5bdcfa8c5a8197c4a8ad8992da6a401c8f3c30d122d77af703cbca542d149676c94f8b8c2bbbeb5b6b5ea98c0cbbf6b4", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000800010063627100180402001000050001000000000000000500000004040600"/1068], 0x444}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0xffffffffffffffc7, &(0x7f0000000300)={&(0x7f0000000280)=@dellink={0x28, 0x66, 0x30479e840602a76b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x28}}, 0x0) [ 300.417182] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:30 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(0x0) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 300.565201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5563 sclass=netlink_route_socket pig=11915 comm=syz-executor.3 17:38:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000000019, &(0x7f0000548000)=0x3ffe, 0x4) sendto$inet6(r0, 0x0, 0xffffffffffffff68, 0x0, &(0x7f0000000280)={0xa, 0x4e21, 0x0, @dev}, 0x1c) recvmmsg(r0, &(0x7f0000005c80)=[{{&(0x7f0000000140)=@nl=@unspec, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffff10}}], 0x16a, 0x2000, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={r3}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={r3, 0x20, "512e775175d7d2158e5c8ae29ae8556ceff6da04e04b37c4fa84f91e02212d87"}, &(0x7f0000000040)=0x28) 17:38:30 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000000)='u', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, 0x0, &(0x7f000021affc)) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x8, 0x6, 0x0, 0x1000000000000, 0xfffffffffffffffd, 0x0, 0xf026, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffc01, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0xfffffffffffffffe, 0x17fffd, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = epoll_create(0x10003) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0xa0000012}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000280)) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e22, @rand_addr=0x80000000}, 0x10) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x6583, @dev}, 0x10) pipe(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) sendmmsg(r6, &(0x7f0000001380), 0x0, 0x2000000) dup(0xffffffffffffffff) [ 300.679477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 300.731592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5563 sclass=netlink_route_socket pig=11915 comm=syz-executor.3 17:38:30 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) write$P9_RXATTRCREATE(r0, &(0x7f0000000200)={0x7, 0x21, 0x1}, 0x7) r1 = socket(0x11, 0x3, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000100)={0x7a00000000000000, 0x3000, 0x1, 0x2, 0x1c}) syz_extract_tcp_res(&(0x7f00000000c0), 0xb60f, 0x7fff) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x102, 0x4) sendfile(r1, r4, 0x0, 0x4e68d5f8) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 300.800298] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 300.897837] llc_conn_state_process: llc_conn_service failed 17:38:30 executing program 3: 17:38:30 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:30 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 301.042920] llc_conn_state_process: llc_conn_service failed [ 301.046380] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 17:38:31 executing program 1: 17:38:31 executing program 3: 17:38:31 executing program 2: 17:38:31 executing program 0: 17:38:31 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:31 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:31 executing program 3: 17:38:31 executing program 2: 17:38:31 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:31 executing program 0: 17:38:31 executing program 1: 17:38:31 executing program 3: 17:38:31 executing program 0: 17:38:31 executing program 2: 17:38:31 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:31 executing program 1: 17:38:31 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:31 executing program 2: 17:38:31 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001000), 0xc5) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:31 executing program 0: 17:38:31 executing program 3: 17:38:31 executing program 2: 17:38:31 executing program 1: 17:38:32 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:32 executing program 3: 17:38:32 executing program 0: 17:38:32 executing program 1: 17:38:32 executing program 2: 17:38:32 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:32 executing program 0: 17:38:32 executing program 3: 17:38:32 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:32 executing program 2: 17:38:32 executing program 1: 17:38:32 executing program 3: 17:38:32 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:32 executing program 2: 17:38:32 executing program 1: 17:38:32 executing program 0: 17:38:32 executing program 1: [ 302.760513] kauditd_printk_skb: 22 callbacks suppressed [ 302.760527] audit: type=1800 audit(1569519512.626:389): pid=12061 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17028 res=0 [ 302.913441] audit: type=1804 audit(1569519512.666:390): pid=12052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/135/file0" dev="sda1" ino=17028 res=1 17:38:32 executing program 2: 17:38:32 executing program 3: 17:38:32 executing program 0: 17:38:32 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:32 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:32 executing program 1: [ 303.016394] audit: type=1804 audit(1569519512.676:391): pid=12052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/135/file0" dev="sda1" ino=17028 res=1 17:38:33 executing program 0: 17:38:33 executing program 2: 17:38:33 executing program 3: 17:38:33 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:33 executing program 1: 17:38:33 executing program 0: 17:38:33 executing program 2: 17:38:33 executing program 3: [ 303.316121] audit: type=1800 audit(1569519513.186:392): pid=12090 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17040 res=0 17:38:33 executing program 1: 17:38:33 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 303.450932] audit: type=1804 audit(1569519513.186:393): pid=12090 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/136/file0" dev="sda1" ino=17040 res=1 [ 303.622590] audit: type=1804 audit(1569519513.216:394): pid=12090 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/136/file0" dev="sda1" ino=17040 res=1 17:38:33 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:33 executing program 2: 17:38:33 executing program 3: 17:38:33 executing program 0: 17:38:33 executing program 1: 17:38:33 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:33 executing program 0: 17:38:33 executing program 1: 17:38:33 executing program 2: 17:38:33 executing program 3: 17:38:33 executing program 3: 17:38:33 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 304.027287] audit: type=1800 audit(1569519513.896:395): pid=12137 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17013 res=0 [ 304.106715] audit: type=1804 audit(1569519513.926:396): pid=12137 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/137/file0" dev="sda1" ino=17013 res=1 17:38:34 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:34 executing program 0: 17:38:34 executing program 1: 17:38:34 executing program 2: 17:38:34 executing program 3: 17:38:34 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 304.234367] audit: type=1804 audit(1569519513.926:397): pid=12137 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/137/file0" dev="sda1" ino=17013 res=1 17:38:34 executing program 2: 17:38:34 executing program 3: 17:38:34 executing program 1: 17:38:34 executing program 0: 17:38:34 executing program 1: 17:38:34 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 304.648121] audit: type=1800 audit(1569519514.516:398): pid=12173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17037 res=0 17:38:34 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:34 executing program 3: 17:38:34 executing program 2: 17:38:34 executing program 0: 17:38:34 executing program 1: 17:38:34 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:34 executing program 0: 17:38:34 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:34 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:34 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:34 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:34 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:35 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:35 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:35 executing program 3: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)=0x48b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0x1}, [{0x2, 0x2}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:35 executing program 1: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:35 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000000)='u', 0x1) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, 0x0, &(0x7f000021affc)) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x8, 0x6, 0x0, 0x1000000000000, 0xfffffffffffffffd, 0x0, 0xf026, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffc01, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0xfffffffffffffffe, 0x17fffd, 0x7, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x1, @multicast2}}, 0x1e) r2 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = epoll_create(0x10003) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000040)={0xa0000012}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f0000000280)) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e22, @rand_addr=0x80000000}, 0x10) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x6583, @dev}, 0x10) pipe(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r6, 0x0) sendmmsg(r6, &(0x7f0000001380), 0x0, 0x2000000) dup(0xffffffffffffffff) 17:38:35 executing program 3: ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4d304}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) write(r1, &(0x7f0000000080)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x11) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_open_dev$usb(0x0, 0x40000fffffa, 0x80002) 17:38:35 executing program 0: delete_module(&(0x7f0000000140)='fd/4\x00', 0x800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x6000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, &(0x7f0000000200)='net/dev_mcast\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, 0x0) lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xfffffffffffffde4, 0x1f, 0x2}, 0xffffffffffffff30) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f00000000c0)={0x0, "bafb5954803bf2e4a78baa33f13b8845a37fe1bc501498d8fda0815a2ba81187"}) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000700)={"c2e15d35116aeb4218966c70ccef58153256147a5c0bdb0a3c8468e920ccc3f51230aeadab7e15dc80a62fdbbc9e422396355b346b720b219ee184493028b6ec771894f7f8577a7f7042c554841857b49034a60ddf9c0a90c0bc2e9b913e6176f6aad697c487af28ecfdb62005c0d9c494b462dfa150c451ff009be8d0be4826137adf5244cb6995e51ab4f079e2a37b1cbb2618b998de33eee09ba679ac6f039aaab2b8511321e0f9f7a3a96ee7dcf5c34466a49b5f675eab01accc09a76eeaa50662e4652c1b073039735267045d5b7c17ebb4b4eab0eaecda7ac4f29de2f2995accbf7164bf1a72ce504e82442e2d38c345dab2497208ee21d766d891763b8417724e9e61c1497d3187d8bc957c43c52d9054223b04f2a15507db1862c5f7ce8c895153db1172955e75baa39126e34610df2a83f55e3ab0bcdbfbe47ff367ad9ae29f8b20712714e64b075600ee200a8157de32ad484f442c9082628e3b9713decbc12dc7c73aedac065529dfaae6e62bbfc4066ef953dbd0d7692aff2e01314332e3f19cfd98e2227fe3bd8f3930b103ba5686c8feb31fb99c24efccacf3d31c2d84e32687026743df23372de3e8ee7fbf7af8539f53de2b09fdb2820646d2a09c285c1ada2064b6158d2dda1693ca6bd092f04259fee03f8ac7baae66b63de8d52747088ce5ba246d184c57984dd56c8687a70358e25a9df22c2ee6b062130ddcd0222be6917fada193c1c3ce73536d8a5d3cc0545922b58b966af1f2818fd48c55d85eb9ca30502456c38a732d3edb5aa1cfb7c007f3d4b36582b3c5e033934624ffef9f076baf93037ddf459c496d6febf1c8c188141142dc698327b10268b768481def61e6b09d5c72bba36eed285827cd09d204bf55952722ecd5bc1694d86b421b4a7af90aac93086d22c5378d789e55fdbe9c79676caf0b737cb14845fab3ad00476ff6e40e213c47813c287a2a0d21edb648bf95df706198a4d993c4178401a77b8c51954c0fbd8b479bfa35803e78216cd920ff9ee54b76012a0da9bd145d59d83e19942f03aa5e2a827163018fbf253c7ac655cbe7c5bc5b32f88825d79ac9e352d9fd4760140bdb74a779b2772f8a8991922b7aab3a30ae7479b651f08958c885929608f39ac74c6f987a89403f8848a5a5ab1416f4a57c0c880b9bcb058ed132d6432236aab0e1fda3796df96d71f78d2942166b95f41ac9b3bcbc0e4db2123fba9be9ff72e6c6ecde93bcdaa44c1091b6ed8cb5be37b372fa767aac03de7b6762350f39b848d01cccf6bf5c61a056fb36d5059013fbd4cf60192c03bec624d282c56ec3b0fa948632a0242d60f64f8b9b866671b078de951bf43c57d4e828a4f4c6eb08500b7f8a0553881df2fbfb565d28fe760eec8d79df2d1871da76b94ffc9fe35b7485a6b32dc80043dd5c0df7f8b5b91fd05752fe"}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) syz_open_dev$usb(0x0, 0x8000, 0x181040) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 305.837210] llc_conn_state_process: llc_conn_service failed 17:38:35 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2181b, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcab0d5e0be6e47bf070") mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) read$FUSE(r1, &(0x7f0000000340), 0x1000) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 17:38:35 executing program 0: delete_module(&(0x7f0000000140)='fd/4\x00', 0x800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x6000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, &(0x7f0000000200)='net/dev_mcast\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, 0x0) lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xfffffffffffffde4, 0x1f, 0x2}, 0xffffffffffffff30) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f00000000c0)={0x0, "bafb5954803bf2e4a78baa33f13b8845a37fe1bc501498d8fda0815a2ba81187"}) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000700)={"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"}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) syz_open_dev$usb(0x0, 0x8000, 0x181040) 17:38:35 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:35 executing program 1: delete_module(&(0x7f0000000140)='fd/4\x00', 0x800) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x6000, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) syz_open_procfs(0x0, &(0x7f0000000200)='net/dev_mcast\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, 0x0) lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xfffffffffffffde4, 0x1f, 0x2}, 0xffffffffffffff30) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f00000000c0)={0x0, "bafb5954803bf2e4a78baa33f13b8845a37fe1bc501498d8fda0815a2ba81187"}) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000700)={"c2e15d35116aeb4218966c70ccef58153256147a5c0bdb0a3c8468e920ccc3f51230aeadab7e15dc80a62fdbbc9e422396355b346b720b219ee184493028b6ec771894f7f8577a7f7042c554841857b49034a60ddf9c0a90c0bc2e9b913e6176f6aad697c487af28ecfdb62005c0d9c494b462dfa150c451ff009be8d0be4826137adf5244cb6995e51ab4f079e2a37b1cbb2618b998de33eee09ba679ac6f039aaab2b8511321e0f9f7a3a96ee7dcf5c34466a49b5f675eab01accc09a76eeaa50662e4652c1b073039735267045d5b7c17ebb4b4eab0eaecda7ac4f29de2f2995accbf7164bf1a72ce504e82442e2d38c345dab2497208ee21d766d891763b8417724e9e61c1497d3187d8bc957c43c52d9054223b04f2a15507db1862c5f7ce8c895153db1172955e75baa39126e34610df2a83f55e3ab0bcdbfbe47ff367ad9ae29f8b20712714e64b075600ee200a8157de32ad484f442c9082628e3b9713decbc12dc7c73aedac065529dfaae6e62bbfc4066ef953dbd0d7692aff2e01314332e3f19cfd98e2227fe3bd8f3930b103ba5686c8feb31fb99c24efccacf3d31c2d84e32687026743df23372de3e8ee7fbf7af8539f53de2b09fdb2820646d2a09c285c1ada2064b6158d2dda1693ca6bd092f04259fee03f8ac7baae66b63de8d52747088ce5ba246d184c57984dd56c8687a70358e25a9df22c2ee6b062130ddcd0222be6917fada193c1c3ce73536d8a5d3cc0545922b58b966af1f2818fd48c55d85eb9ca30502456c38a732d3edb5aa1cfb7c007f3d4b36582b3c5e033934624ffef9f076baf93037ddf459c496d6febf1c8c188141142dc698327b10268b768481def61e6b09d5c72bba36eed285827cd09d204bf55952722ecd5bc1694d86b421b4a7af90aac93086d22c5378d789e55fdbe9c79676caf0b737cb14845fab3ad00476ff6e40e213c47813c287a2a0d21edb648bf95df706198a4d993c4178401a77b8c51954c0fbd8b479bfa35803e78216cd920ff9ee54b76012a0da9bd145d59d83e19942f03aa5e2a827163018fbf253c7ac655cbe7c5bc5b32f88825d79ac9e352d9fd4760140bdb74a779b2772f8a8991922b7aab3a30ae7479b651f08958c885929608f39ac74c6f987a89403f8848a5a5ab1416f4a57c0c880b9bcb058ed132d6432236aab0e1fda3796df96d71f78d2942166b95f41ac9b3bcbc0e4db2123fba9be9ff72e6c6ecde93bcdaa44c1091b6ed8cb5be37b372fa767aac03de7b6762350f39b848d01cccf6bf5c61a056fb36d5059013fbd4cf60192c03bec624d282c56ec3b0fa948632a0242d60f64f8b9b866671b078de951bf43c57d4e828a4f4c6eb08500b7f8a0553881df2fbfb565d28fe760eec8d79df2d1871da76b94ffc9fe35b7485a6b32dc80043dd5c0df7f8b5b91fd05752fe"}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) syz_open_dev$usb(0x0, 0x8000, 0x181040) 17:38:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000140)={0x8, 0x20, 0x19, 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x2, 0x5}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) r3 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000580)={r6, @in={{0x2, 0x4e24, @rand_addr=0x100}}, [0x9, 0x0, 0x3, 0x4, 0x8, 0x80, 0x2000000000000, 0xd878, 0x7ff, 0xeaef, 0xffffffff, 0x6, 0x23932056, 0xb34, 0x2]}, &(0x7f0000000680)=0x100) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x100000001, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x9, 0x498041) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, {0x6, @broadcast}, 0x40, {0x2, 0x4e23, @empty}, 'veth0\x00'}) r8 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r8, 0xc0d05605, &(0x7f00000007c0)={0x1, @sliced}) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000400)={'ip6gre0\x00', 0x50}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0xffffffffffffffff}, 0x1c) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r9, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7fffffff, 0x80000) mkdirat(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:36 executing program 1: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{}], {}, [{0x8, 0x3}, {0x8, 0x1}]}, 0x3c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:36 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x8, &(0x7f0000000000)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) r4 = accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x12b) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f00000000c0)='system_u:object_r:groupadd_exec_t:s0\x00', 0x25, 0x2) shutdown(r1, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000380)) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000400)) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f0000000100)) close(r3) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8ae", 0x1a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) 17:38:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000200)="24000000210007041dfffd946f610500020003e8fe02000000010800080011000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) wait4(0x0, 0x0, 0x0, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x300) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x3, 0x0}}}, [0x6, 0xfbe2, 0x7, 0xa5d, 0xffffffffffffa52d, 0x80, 0x80000001, 0x9, 0x100000001, 0x3ff, 0x75d, 0x5, 0x758c, 0x1ff, 0x5f]}, &(0x7f0000000080)=0x100) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) prctl$PR_SET_PTRACER(0x59616d61, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x11}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{0x8, 0x3}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:36 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 306.654124] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:38:36 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@default, @netrom, @netrom, @default, @null, @remote, @null]}, &(0x7f00000000c0)=0x48, 0x40800) ioctl$FICLONE(r1, 0x40049409, r2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x4000) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{0x8, 0x3}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 306.846003] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:38:36 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) 17:38:36 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{0x8, 0x3}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:36 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x8, &(0x7f0000000000)) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) r4 = accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x12b) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, &(0x7f00000000c0)='system_u:object_r:groupadd_exec_t:s0\x00', 0x25, 0x2) shutdown(r1, 0x1) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000380)) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f0000000400)) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, &(0x7f0000000100)) close(r3) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8ae", 0x1a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) [ 307.330353] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:38:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000140)={0x8, 0x20, 0x19, 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x2, 0x5}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) r3 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000580)={r6, @in={{0x2, 0x4e24, @rand_addr=0x100}}, [0x9, 0x0, 0x3, 0x4, 0x8, 0x80, 0x2000000000000, 0xd878, 0x7ff, 0xeaef, 0xffffffff, 0x6, 0x23932056, 0xb34, 0x2]}, &(0x7f0000000680)=0x100) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x100000001, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x9, 0x498041) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, {0x6, @broadcast}, 0x40, {0x2, 0x4e23, @empty}, 'veth0\x00'}) r8 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r8, 0xc0d05605, &(0x7f00000007c0)={0x1, @sliced}) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000400)={'ip6gre0\x00', 0x50}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0xffffffffffffffff}, 0x1c) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r9, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7fffffff, 0x80000) mkdirat(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 17:38:37 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:37 executing program 1: ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000180)=""/6) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) write$uinput_user_dev(r3, &(0x7f0000000480)={'syz0\x00', {0x6, 0x8, 0x1, 0x101}, 0x53, [0xe4, 0xf2, 0x400000, 0x1, 0x101, 0x200, 0x2, 0x2, 0xffff, 0x800, 0xff57, 0x5, 0x7052, 0x50, 0xfffff4a5, 0x2ba6, 0x2, 0x6, 0x1f, 0xf96, 0x0, 0x606393f4, 0x30abc3ef, 0x6, 0x101, 0x7ff, 0x81, 0x9, 0x388f, 0x6, 0x3, 0xffffffff, 0x5, 0x1, 0x1, 0x4, 0x8, 0x4, 0x10001, 0xa95, 0x0, 0x20, 0x40, 0x0, 0xaa, 0x8000, 0x1ff, 0xfb, 0x5, 0x1, 0xfffff3e8, 0x0, 0x3, 0x7, 0x8, 0x200, 0x7fff, 0x9, 0xff, 0x2, 0xfffffffb, 0x7, 0x400, 0xa83], [0x3f, 0x96e, 0x9, 0x4, 0x7f, 0x4, 0xad, 0xfffffff9, 0x7, 0x40, 0x800, 0x81, 0x6, 0x2, 0x6, 0x20, 0xfffff001, 0xfffffffc, 0x10001, 0x1800, 0xfffffffe, 0x3f, 0x4, 0x5, 0x25f, 0x1000, 0x101, 0x1, 0x3, 0x1, 0x2, 0x8, 0x9e4, 0x5, 0x8001, 0xfffffffc, 0x1, 0x4, 0x1f, 0x1000, 0x6, 0x2, 0xffffffff, 0x80000000, 0x2, 0x3, 0x6, 0x1, 0x7, 0x4, 0xf4, 0x2, 0xfffffffd, 0xfffffff7, 0x0, 0x6, 0x0, 0x9, 0xd0d, 0x2, 0x2, 0x9, 0x7, 0x5], [0x6, 0x0, 0x8009, 0x6, 0xffff70f1, 0x10001, 0x3e, 0x301, 0x529, 0x101, 0x6, 0x8, 0x6, 0x0, 0x2, 0xffff, 0x2, 0x10000, 0x10003, 0x0, 0x5, 0x1000, 0x8, 0x200, 0xffff, 0x400, 0x8, 0xf9, 0x0, 0x5, 0x9, 0x40, 0x3, 0x9, 0x3f, 0x9, 0xff, 0x9, 0x1, 0x8, 0x1, 0x9, 0x9, 0x4, 0x16a, 0xb5e, 0xfffffffa, 0x4ccb, 0x80000000, 0x8, 0x7, 0xfffffffd, 0x800, 0x0, 0x2, 0x400, 0x7fffffff, 0x2, 0x1, 0xff, 0x6, 0x7, 0xfff, 0x3f], [0x0, 0x6dee74cf, 0x14b9, 0x9, 0x7ff, 0x7, 0x3, 0x1000, 0x1000, 0x6, 0x3f, 0x10001, 0x7, 0x1, 0x2381, 0x3, 0x4, 0x0, 0x800, 0x0, 0x7f, 0x3, 0xd9, 0x8001, 0x2, 0x2, 0x1, 0x1, 0x9, 0x4, 0x8, 0x1, 0x1, 0x4, 0x1, 0xb0e, 0xfffffff7, 0xe7, 0x3, 0x0, 0x101, 0x0, 0x4, 0x8001, 0x40, 0x5, 0x4, 0x66d1, 0x6, 0x4, 0xffffffff, 0x1, 0x6e9, 0xa11b, 0x525c1e32, 0x2, 0x6, 0xffff1818, 0x4, 0x5, 0x401, 0x6, 0x1, 0x8]}, 0x45c) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r4, r1, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000440)=0x1c) 17:38:37 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}]}, 0x2c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:38 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}]}, 0x2c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x4) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') timer_create(0x0, &(0x7f00000004c0)={0x0, 0xa, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000500)) timer_delete(0x0) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000011c0)={0x8, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\fc\x00\x00\x00c@@'], 0x0, 0x0, 0x0}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000040)={&(0x7f0000341000/0x1000)=nil, 0x6, 0x1, 0x2, &(0x7f0000d2f000/0x3000)=nil, 0xffff}) clock_gettime(0x0, &(0x7f0000000300)) 17:38:38 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) 17:38:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000140)={0x8, 0x20, 0x19, 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x2, 0x5}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) r3 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000580)={r6, @in={{0x2, 0x4e24, @rand_addr=0x100}}, [0x9, 0x0, 0x3, 0x4, 0x8, 0x80, 0x2000000000000, 0xd878, 0x7ff, 0xeaef, 0xffffffff, 0x6, 0x23932056, 0xb34, 0x2]}, &(0x7f0000000680)=0x100) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x100000001, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x9, 0x498041) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, {0x6, @broadcast}, 0x40, {0x2, 0x4e23, @empty}, 'veth0\x00'}) r8 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r8, 0xc0d05605, &(0x7f00000007c0)={0x1, @sliced}) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000400)={'ip6gre0\x00', 0x50}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0xffffffffffffffff}, 0x1c) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r9, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7fffffff, 0x80000) mkdirat(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 17:38:38 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x0, @random="f896e9ae10ee"}, 0x20, {0x2, 0x0, @local}, 'ip6_vti0\x00'}) 17:38:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x40000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3f, 0x1f, 0xc, 0x4, 0x0, 0x1ff, 0x8, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x419303bbc0830df1, @perf_bp={&(0x7f0000000040), 0x3}, 0x10, 0xea6e, 0x4, 0x4, 0xaf0, 0xfffffffd, 0x200}, 0x0, 0x8, r1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) fcntl$getflags(r0, 0x814) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000280)='veth0_to_bond\x00', 0x10) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x1000) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000000)=0x20000, 0x4) sendto$inet(r2, &(0x7f0000000080), 0xffffffffffffff02, 0x420ffe0, 0x0, 0xfffffffffffffd37) 17:38:38 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}]}, 0x2c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) 17:38:38 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000040)="6d95a45b5e5a805d65d5863cb3bd3688c3c34a38eeb08c33c3f6924ff6b3cd1f87caee8044ef7ecbad21694d26213fa50682c97be69f54301f637146c2f0236c57c27f9795b2e5f5e9acbdd1d3db7c2f8e626c56ff9e25c8880360450276acd83f1da6a8c382a2d192c08989a74b597c8c86b8900ec4851a54e623e074ac34b71b9665b6bb795bc5e85bf4935c1e4611cfaab728ced7e8f20a688fc5b03fdbff34e332c9ae7428993684632163e55b3fc1614f58ca91f1c2a01392c8a94cd95c682974509e1ef7d29f97cfe980f653ef85cd5e83c9c1197fc8f068eebb61150209ea99e793946baa", 0xe8}, {&(0x7f0000000380)}, {0x0}, {&(0x7f00000005c0)="033ab823ba59056c98c15cfaaf83746c6503c6708d6ff539624ad5fb80213f9715bbea55311171bba52b1cc20dd11f5587758de634bbcbbe2e9594b0f302e822c8d77f01b471832d10278f987b399c6e1b4f5b04ed00099786409346d2aaf2f6f12235f77d2995b29661d6f1518c680e79662a88a751399d004e0127ed7f", 0x7e}], 0x4, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{0x2, 0x1, 0x4b, 0xfffff001}, {0x9, 0x3f, 0x0, 0x9}, {0x53, 0x4, 0x20, 0xfa6}, {0x9, 0x38, 0x20, 0x8}]}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000680)={@empty, @initdev}, &(0x7f00000006c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000004c0)) sendfile(r3, r3, 0x0, 0x24000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = mq_open(&(0x7f0000000280)='/dev/amidi#\x00', 0x40, 0x2, &(0x7f00000002c0)={0x40, 0x7, 0x8, 0xfffffffffffffffa, 0x1000, 0x200, 0x6, 0x3ff}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r6, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r8}}, 0x48) r9 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r11}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r11}}, 0xc) r12 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r13, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r14}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r14}}, 0xc) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r15, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r15, &(0x7f00000000c0)={0xa, 0xea, 0xfa00, {r14}}, 0x267) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r8, 0xffffffff}}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="7cf50000", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x10000025) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x1261, r4) [ 308.972400] kauditd_printk_skb: 27 callbacks suppressed [ 308.972414] audit: type=1800 audit(1569519518.846:426): pid=12387 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17002 res=0 17:38:38 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000002b80)=ANY=[@ANYBLOB="aaaaaaaaaaaa50637b8ec26f51e660d8652b0018060000000000000000000000000000000000fe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c200009078000003030000"], 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x10b404) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x9) 17:38:39 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.']) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @local, @local}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='setgroups\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) write$FUSE_LK(r2, &(0x7f0000000040)={0x28, 0x0, 0x2, {{0x9, 0x5, 0x2, r3}}}, 0x28) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000080)={0x0, r4/1000+30000}, 0x10) sendto$inet6(r1, &(0x7f00000002c0)="fa01711425a6b42ddc5c46757f6b420f356f4f008ce309074327bfdd3558461fe59a8fd6186e0a11a693ed5f54b054e87042b72df1ce9aa8d1c176bea1239e42ab4119d8ebba7d7572e655238e8156a75410f44a7665b186275f2182aeae9570569bea3a5a5e22475ef4d24a9fa031de380e0d1a5ddf665a39fa4317200e1cf4457dd6a9c3a948a4d159e7c13db66c42327db092a6924604db4343b6386fd648d7e27be1cfc4ebcd71ff34048236cd59a7d4401307f3277e5ed875001a30134ed752a5b811689ab9c8", 0x2a2b178a6daa88db, 0x5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@empty, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180)) fchownat(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000002c0)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty}, 0xc) r5 = open(0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000100)=""/230, 0xe6) 17:38:39 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 309.171566] audit: type=1804 audit(1569519518.876:427): pid=12387 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/144/file0" dev="sda1" ino=17002 res=1 17:38:39 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f00000003c0)=""/120, 0x78}, {0x0}], 0x2, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="003cd430503c41449822b7c0"], 0x3}}, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, 0x0, 0x151) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0xe) r3 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r3, 0x0, 0x0, 0x40007) open$dir(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0xff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x7fffffa7) r4 = open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) open(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'posix_acl_accessselfmime_type@\x00'}, &(0x7f0000000300)='\x00', 0x1, 0x3) [ 309.348393] audit: type=1804 audit(1569519518.876:428): pid=12387 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/144/file0" dev="sda1" ino=17002 res=1 [ 309.531205] print_req_error: I/O error, dev loop0, sector 40 [ 309.538816] print_req_error: I/O error, dev loop0, sector 72 [ 309.544804] print_req_error: I/O error, dev loop0, sector 136 [ 309.578874] print_req_error: I/O error, dev loop0, sector 520 17:38:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000140)={0x8, 0x20, 0x19, 0x5}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0xda95, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x2, 0x5}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) r3 = syz_open_dev$midi(&(0x7f0000000540)='/dev/midi#\x00', 0x6, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000080)={r6}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000580)={r6, @in={{0x2, 0x4e24, @rand_addr=0x100}}, [0x9, 0x0, 0x3, 0x4, 0x8, 0x80, 0x2000000000000, 0xd878, 0x7ff, 0xeaef, 0xffffffff, 0x6, 0x23932056, 0xb34, 0x2]}, &(0x7f0000000680)=0x100) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x100000001, 0x0) mq_timedreceive(r2, &(0x7f0000000280)=""/204, 0x12f, 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x9, 0x498041) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}, {0x6, @broadcast}, 0x40, {0x2, 0x4e23, @empty}, 'veth0\x00'}) r8 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r8, 0xc0d05605, &(0x7f00000007c0)={0x1, @sliced}) ioctl$sock_inet_SIOCSIFPFLAGS(r8, 0x8934, &(0x7f0000000400)={'ip6gre0\x00', 0x50}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0xffffffffffffffff}, 0x1c) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r9, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') syz_open_dev$vcsa(&(0x7f0000000440)='/dev/vcsa#\x00', 0x7fffffff, 0x80000) mkdirat(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 17:38:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="726772706c76622c002db69c2fe573e5b6383fe8585ddc1fbe"]) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000140)={0xb, 0x77, 0x1, 0xfffffffe}, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x20400, 0x80) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 309.712068] audit: type=1800 audit(1569519519.576:429): pid=12427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16532 res=0 17:38:39 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(0xffffffffffffffff, 0x4080aebf, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f0000000040)="6d95a45b5e5a805d65d5863cb3bd3688c3c34a38eeb08c33c3f6924ff6b3cd1f87caee8044ef7ecbad21694d26213fa50682c97be69f54301f637146c2f0236c57c27f9795b2e5f5e9acbdd1d3db7c2f8e626c56ff9e25c8880360450276acd83f1da6a8c382a2d192c08989a74b597c8c86b8900ec4851a54e623e074ac34b71b9665b6bb795bc5e85bf4935c1e4611cfaab728ced7e8f20a688fc5b03fdbff34e332c9ae7428993684632163e55b3fc1614f58ca91f1c2a01392c8a94cd95c682974509e1ef7d29f97cfe980f653ef85cd5e83c9c1197fc8f068eebb61150209ea99e793946baa", 0xe8}, {&(0x7f0000000380)}, {0x0}, {&(0x7f00000005c0)="033ab823ba59056c98c15cfaaf83746c6503c6708d6ff539624ad5fb80213f9715bbea55311171bba52b1cc20dd11f5587758de634bbcbbe2e9594b0f302e822c8d77f01b471832d10278f987b399c6e1b4f5b04ed00099786409346d2aaf2f6f12235f77d2995b29661d6f1518c680e79662a88a751399d004e0127ed7f", 0x7e}], 0x4, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{0x2, 0x1, 0x4b, 0xfffff001}, {0x9, 0x3f, 0x0, 0x9}, {0x53, 0x4, 0x20, 0xfa6}, {0x9, 0x38, 0x20, 0x8}]}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000680)={@empty, @initdev}, &(0x7f00000006c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4181, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000004c0)) sendfile(r3, r3, 0x0, 0x24000000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) r6 = mq_open(&(0x7f0000000280)='/dev/amidi#\x00', 0x40, 0x2, &(0x7f00000002c0)={0x40, 0x7, 0x8, 0xfffffffffffffffa, 0x1000, 0x200, 0x6, 0x3ff}) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1000000, 0x12, r6, 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r8}}, 0x48) r9 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r10, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r11}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r9, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r11}}, 0xc) r12 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) r13 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r13, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x0, @local}, r14}}, 0x48) write$RDMA_USER_CM_CMD_DISCONNECT(r12, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r14}}, 0xc) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r15, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r15, &(0x7f00000000c0)={0xa, 0xea, 0xfa00, {r14}}, 0x267) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r5, &(0x7f0000000400)={0x4, 0x8, 0xfa00, {r8, 0xffffffff}}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="7cf50000", @ANYRES16, @ANYBLOB="3502000000000028000100080008000200000014000300ac1414aa00000000000000000000e2ff0700090068000000080005000900000008c7723f0b0a9fac80e5948a6fccd49fefe8f9e9b908000400091c0000060000000000000000000039e020687ff23a47a21cd631279688e03f319836df945700228ff1dcec3385449c25b4471f41b0bb7aea35be96c596dba0fc61578f5b909dacb5bab669e8cc9a46667a1db7f18e2650366fa40297686bd079df7d4f30f14797d2e98eb93551d9e14fd6b5d81e2e08828ff4585800757316546e5819e1135d8dcabdb9cf81ab58318b635954bea829f6b0b1a590e13dd870846573d22b2bbe80a2c841c83dd0c95c9ba5e70cd04162dd5e95da58cc8d10d34ef777976d757fe47e220a82"], 0x3}}, 0x10000025) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x1261, r4) [ 309.792557] WARNING: CPU: 0 PID: 9 at kernel/fork.c:408 free_task+0xf8/0x120 [ 309.794961] audit: type=1804 audit(1569519519.616:430): pid=12427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/145/file0" dev="sda1" ino=16532 res=1 [ 309.799969] Kernel panic - not syncing: panic_on_warn set ... [ 309.799969] [ 309.834340] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.75 #0 [ 309.840673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.850043] Call Trace: [ 309.852651] dump_stack+0x172/0x1f0 [ 309.856301] panic+0x263/0x507 [ 309.859517] ? __warn_printk+0xf3/0xf3 [ 309.863428] ? free_task+0xf8/0x120 [ 309.867078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.872629] ? __warn.cold+0x5/0x4a [ 309.876265] ? __warn+0xe8/0x1d0 [ 309.879643] ? free_task+0xf8/0x120 [ 309.883289] __warn.cold+0x20/0x4a [ 309.886852] ? free_task+0xf8/0x120 [ 309.890495] report_bug+0x263/0x2b0 [ 309.894130] do_error_trap+0x204/0x360 [ 309.895898] audit: type=1804 audit(1569519519.616:431): pid=12427 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir298694716/syzkaller.Mh9HQv/145/file0" dev="sda1" ino=16532 res=1 [ 309.898034] ? math_error+0x340/0x340 [ 309.898051] ? __atomic_notifier_call_chain+0xd6/0x1a0 [ 309.898068] ? error_entry+0x7c/0xe0 [ 309.937229] ? trace_hardirqs_off_caller+0x65/0x220 [ 309.942270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.947146] do_invalid_op+0x1b/0x20 [ 309.950870] invalid_op+0x14/0x20 [ 309.954763] RIP: 0010:free_task+0xf8/0x120 [ 309.959002] Code: 48 8b 3d fb 36 3c 08 4c 89 e6 e8 d3 8c 63 00 5b 41 5c 41 5d 5d c3 e8 c7 32 2d 00 4c 89 e7 e8 2f 6f 09 00 eb d6 e8 b8 32 2d 00 <0f> 0b e9 6a ff ff ff e8 0c c6 63 00 eb ab 4c 89 ef e8 02 c6 63 00 [ 309.977918] RSP: 0018:ffff8880aa237c10 EFLAGS: 00010206 [ 309.983301] RAX: ffff8880aa226240 RBX: 0000000000000001 RCX: ffffffff813e2f31 17:38:39 executing program 4: perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') setsockopt(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000011c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000480)={{}, {}, [{0x2, 0x2}], {}, [{}]}, 0x34, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x6a, 0x7d, 0x2, {{0x0, 0x3b, 0x13d6, 0x3, {0x8b, 0x4, 0x5}, 0x64280000, 0x800, 0x1000, 0x7e, 0x2, 'lo', 0x3, 'syz', 0x3, 'syz'}, 0x1a, '-\\nodev.-vboxnet0!md5sumlo', 0x0, 0x0, r0}}, 0x6a) syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8}}}, 0x24}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000540)={0x1, [0x0]}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000005c0)={r1, 0x6}, 0x8) [ 309.990666] RDX: 0000000000000100 RSI: ffffffff813e2fc8 RDI: 0000000000000005 [ 309.997471] ================================================================== [ 309.997939] RBP: ffff8880aa237c28 R08: ffff8880aa226240 R09: ffffed10104af698 [ 309.997952] R10: ffffed10104af697 R11: ffff88808257b4bb R12: ffff88808257a180 [ 310.005411] BUG: KASAN: null-ptr-deref in __validate_process_creds+0x1fe/0x300 [ 310.005426] Read of size 4 at addr 0000000000000004 by task syz-executor.1/12406 [ 310.012671] R13: ffff88808257b4b8 R14: ffff88808efbeda8 R15: ffffffff813fa710 [ 310.012689] ? child_wait_callback+0x270/0x270 [ 310.019953] [ 310.050867] ? free_task+0x61/0x120 [ 310.054494] ? free_task+0xf8/0x120 [ 310.058118] __put_task_struct+0x20f/0x4c0 [ 310.062351] ? child_wait_callback+0x270/0x270 [ 310.066932] delayed_put_task_struct+0x1fb/0x350 [ 310.071681] ? child_wait_callback+0x270/0x270 [ 310.076261] rcu_process_callbacks+0xba0/0x1a30 [ 310.080944] ? __rcu_read_unlock+0x170/0x170 [ 310.085346] ? sched_clock+0x2e/0x50 [ 310.089064] __do_softirq+0x25c/0x921 [ 310.092886] ? pci_mmcfg_check_reserved+0x170/0x170 [ 310.097924] ? takeover_tasklets+0x7b0/0x7b0 [ 310.102349] run_ksoftirqd+0x8e/0x110 [ 310.106151] smpboot_thread_fn+0x6a3/0xa30 [ 310.110396] ? sort_range+0x30/0x30 [ 310.114034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.119570] ? __kthread_parkme+0xfb/0x1b0 [ 310.123804] kthread+0x354/0x420 [ 310.127164] ? sort_range+0x30/0x30 [ 310.130875] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 310.136408] ret_from_fork+0x24/0x30 [ 310.140152] CPU: 1 PID: 12406 Comm: syz-executor.1 Not tainted 4.19.75 #0 [ 310.147081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.156427] Call Trace: [ 310.159011] dump_stack+0x172/0x1f0 [ 310.162638] ? __validate_process_creds+0x1fe/0x300 [ 310.167647] kasan_report.cold+0x199/0x2ba [ 310.171892] check_memory_region+0x123/0x190 [ 310.176294] kasan_check_read+0x11/0x20 [ 310.180455] __validate_process_creds+0x1fe/0x300 [ 310.185291] validate_creds_for_do_exit+0x22/0x26 [ 310.190228] do_exit+0x1ece/0x2fa0 [ 310.193776] ? find_held_lock+0x35/0x130 [ 310.197837] ? task_work_run+0x118/0x1c0 [ 310.201902] ? get_signal+0x384/0x1fc0 [ 310.205804] ? mm_update_next_owner+0x660/0x660 [ 310.210468] ? _raw_spin_unlock_irq+0x28/0x90 [ 310.214951] ? get_signal+0x384/0x1fc0 [ 310.218834] ? _raw_spin_unlock_irq+0x28/0x90 [ 310.223325] do_group_exit+0x135/0x370 [ 310.227206] get_signal+0x3ec/0x1fc0 [ 310.230916] ? __f_unlock_pos+0x19/0x20 [ 310.234889] ? find_held_lock+0x35/0x130 [ 310.238956] do_signal+0x95/0x1960 [ 310.242494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.248022] ? setup_sigcontext+0x7d0/0x7d0 [ 310.252335] ? kick_process+0xef/0x180 [ 310.256232] ? task_work_add+0x9c/0x110 [ 310.260200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.265729] ? fput+0x128/0x1a0 [ 310.269006] ? ksys_write+0x1f1/0x2d0 [ 310.272799] ? exit_to_usermode_loop+0x43/0x2c0 [ 310.277475] ? do_syscall_64+0x53d/0x620 [ 310.281531] ? exit_to_usermode_loop+0x43/0x2c0 [ 310.286195] ? lockdep_hardirqs_on+0x415/0x5d0 [ 310.290771] ? trace_hardirqs_on+0x67/0x220 [ 310.295092] exit_to_usermode_loop+0x244/0x2c0 [ 310.299717] do_syscall_64+0x53d/0x620 [ 310.303623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.308815] RIP: 0033:0x459a29 [ 310.312021] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.330916] RSP: 002b:00007fefbbbb9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 310.338616] RAX: 0000000000000010 RBX: 0000000000000003 RCX: 0000000000459a29 [ 310.345962] RDX: 0000000000000010 RSI: 0000000020000400 RDI: 0000000000000009 [ 310.353220] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 310.360486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fefbbbba6d4 [ 310.367743] R13: 00000000004d0d38 R14: 00000000004e11a0 R15: 00000000ffffffff [ 310.375970] ================================================================== [ 310.383324] Disabling lock debugging due to kernel taint [ 310.390576] Kernel Offset: disabled [ 310.394215] Rebooting in 86400 seconds..