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"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2555.064699] device bridge_slave_1 left promiscuous mode [ 2555.074522] bridge0: port 2(bridge_slave_1) entered disabled state 12:23:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'hsr0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, 0x0) [ 2555.131421] device bridge_slave_0 left promiscuous mode [ 2555.141918] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:20 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='veth0_to_hsr\x00') 12:23:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x19d, 0x0) [ 2555.269622] device hsr_slave_1 left promiscuous mode 12:23:20 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 12:23:20 executing program 4: [ 2555.359529] device hsr_slave_0 left promiscuous mode [ 2555.405313] team0 (unregistering): Port device team_slave_1 removed [ 2555.424506] team0 (unregistering): Port device team_slave_0 removed [ 2555.436701] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2555.484631] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2555.546604] bond0 (unregistering): Released all slaves [ 2555.600139] net_ratelimit: 20 callbacks suppressed [ 2555.600145] protocol 88fb is buggy, dev hsr_slave_0 [ 2555.610337] protocol 88fb is buggy, dev hsr_slave_1 [ 2555.990125] protocol 88fb is buggy, dev hsr_slave_0 [ 2555.995333] protocol 88fb is buggy, dev hsr_slave_1 [ 2556.790183] protocol 88fb is buggy, dev hsr_slave_0 [ 2556.795404] protocol 88fb is buggy, dev hsr_slave_1 [ 2557.471724] IPVS: ftp: loaded support on port[0] = 21 [ 2557.510239] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.515567] protocol 88fb is buggy, dev hsr_slave_1 [ 2557.680242] protocol 88fb is buggy, dev hsr_slave_0 [ 2557.685508] protocol 88fb is buggy, dev hsr_slave_1 [ 2558.431680] chnl_net:caif_netlink_parms(): no params data found [ 2558.467194] bridge0: port 1(bridge_slave_0) entered blocking state [ 2558.474688] bridge0: port 1(bridge_slave_0) entered disabled state [ 2558.482902] device bridge_slave_0 entered promiscuous mode [ 2558.489960] bridge0: port 2(bridge_slave_1) entered blocking state [ 2558.496483] bridge0: port 2(bridge_slave_1) entered disabled state [ 2558.503660] device bridge_slave_1 entered promiscuous mode [ 2558.523465] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2558.532689] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2558.552731] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2558.562514] team0: Port device team_slave_0 added [ 2558.568347] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2558.576118] team0: Port device team_slave_1 added [ 2558.581639] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2558.589154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2558.642450] device hsr_slave_0 entered promiscuous mode [ 2558.720504] device hsr_slave_1 entered promiscuous mode [ 2558.760929] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2558.768408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2558.785354] bridge0: port 2(bridge_slave_1) entered blocking state [ 2558.791763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2558.798580] bridge0: port 1(bridge_slave_0) entered blocking state [ 2558.805041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2558.836492] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2558.844321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2558.854223] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2558.864511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2558.872409] bridge0: port 1(bridge_slave_0) entered disabled state [ 2558.879343] bridge0: port 2(bridge_slave_1) entered disabled state [ 2558.889519] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2558.895758] 8021q: adding VLAN 0 to HW filter on device team0 [ 2558.904897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2558.912687] bridge0: port 1(bridge_slave_0) entered blocking state [ 2558.919045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2558.941923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2558.949695] bridge0: port 2(bridge_slave_1) entered blocking state [ 2558.956101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2558.963670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2558.971623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2558.979589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2558.988709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2558.998164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2559.008557] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2559.015151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2559.028394] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2559.039280] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2559.050212] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2559.059967] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2559.420705] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2560.373504] audit: type=1804 audit(1574166205.970:1837): pid=8263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir482098729/syzkaller.AdGDCJ/0/bus" dev="sda1" ino=17700 res=1 12:23:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 12:23:26 executing program 4: 12:23:26 executing program 1: 12:23:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:23:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r2, &(0x7f0000002680)={'syz1', "b50fd98fb8cb1f648891eac8a1a48991e90e328498373d6a5c1a84da110bc9c96b0850c23581c929c38acea9979fc69a9d52e067419bcc4b48345b6341bf8933d8ddeb74ba64b08366bb675660f7bc1c43762e6ff5392ff4babbadea6b6a925939d197dccc86348ecc2d482c55112e502752817874a8a5b8b8455fd6adf2805ce5eb39b2d112142340476e04d9211f51ca10dfc4ba6a7e43d9ce6d098921efe04e25ada4d15974b3872d5f49ee8301a9e72a6ac3c1cab2e166e97fc939427e3838d671fec8ff4e655b40dde38e028a36685edb954e6c1219d117f491c95fffc00825d73eac76e87222c8a70a562a37d3cd8cac2fdd783844351a1877a89d662421ed3c68655a0fa65bf790747f971dfe5211bf2b19a95c6fb9a9f9924c863da8cd8b5bd60fea618b98c0d91b0ab210c4a0c35947b9098e7c5a8e1bb3967f079cdc26d2fb297611e6c33414e25498832580a36ba832c9a1aa21b69a75a2b93a4cb2201b43ff4b5e138a01f6a89d22fc3f77dc41250d8bc83804e2a320c0d963bf58d697cc963311ef30c562c1c69cf0ac29fb0194e232eec6c7d8efc8969eed5b3d7ce61c0b4ebc96fd23f7f66c82871a4347126c16228e1712ee8df55337b441f31d61e1164701821f2a4d512c2611039e36d2964289ba5fc74a4f8bb6df13cb15334667e36e86fdaa5e709e8e352706cec60222875ce90fb8a023c78e359dbeffebb28113fdc4eb648b3686f229ec505023ed8426c429eddd41d31785c90b762442aeebfb2a580689c4560add1df9c1a291631a6840bc6b5881fcd89140503f5947d4fbce3aa805177f4399b61fcd4102f484d2118cf5de61dd9d7cf57252d6abb3ce39345a322473512e2a3c0b7e3b1a2b4a24ab5580d7af1aab81280fa24a10ac6d8bc92a26f4d9a0c08f2002ba87d08cfc5f187c58edc5c74ddc178e5207866222a174896115a12d6a83c6b512f6f5e0143ae2b1f7107d770726d1cf78837c81e72f25cf910d7a51efae43902dd831589d787fa88a7746db8a4f88e9900db9caab70a219c59c274769a72add8bd7cc7ec2689f14ecc0384546fc55c9f398dab8626d75a075db39bd54abf5ee7f8b42009499ac7dc186b5176d9c6f71f22592ce5c255a98c3f1ed2ca62e5763ad9978af781649d7c0a6729cdd2722d2afc320a1526b403f7f68e140f31ea0394ba769901aa1877a6a857e4fc478b4cf9676de6919a5bf4df55b387083f97386e6d16ec9b1204af4854ccdd0c1e8d3369dcbc257d417af072b8fc111a64441012badfcfe681d1b1e3bb55106d828d986ea788163d6ae10112b71a6a00987a344e03194df42d88b39612bb5af2f7d36362228d351a38492ee0ad45b269c41c092e42768a546e723bf32c1f23af31e3a692bd18579dabebd3d4eb068fc81614a5efd5642834452b864c1dbaecec3ea44f0ba5834d3a45c688a6ddce225d00c9a22b694933c1bd49bac780ea9d8932dbbabaf1cf7584c5af756cf393c741e853b3926adf638541015b5550d0b0a163dad3d4fa587a995243a11318b784540f1453d4a1fc809050882543df74a921b122e9e4c66cf11b4d6b6a1a01fe799cced406ae93ad29c0c8709c27ffc0a131cb4ad4ba3fa0f1023db9f05cdf7405c25723d586b728411bee93785914085f4d11c3f48f728895f4201d33aec7db8468aaa39667bc9d95f0152a38263021d596e42bcfd7604a5e60d6d1496b79c46e0fa54298bb7f9d8eefd24aca29154e40793280aebb9d8010965d608257ab9917f375237b6c119964dc6b7d54c8f5637cb1e22d5d4bf13f76fedc7196e77b7d08fe2fdcdf5e7cad6abdaca2d3802f059630cff3169b4c40fe42cc9172cd9503f02760bac63352762d2e39be2e1e6dcf307208f2755ffc2d43ea1fc3af2402dda8acc7fdcc22a10deccf091790305ca6631a8ae66e6b32559865db0fd71d3c9394a27b5beac5fd21be67e51452893c6b2b5f5f248d92ddb27fe433bdf6c6f1875b98b32fe850b4a6dabee4bfd72b59118e1ae91b37cd7d454c505dc8a70d038aa150f72a3b9b27ca6d923bab6a3d1625c2160306a865bd6024ae3fac62a693470e60b8e8db083c3d175a7f6414a34825f9db5110330b747bbe9944266adce3e510577a1772d5d99d7692680f444dbccbf69a710d8222f437d6dfbd7c801bd36f64153c167b50654f23a4779007a992c67000d1934ef1ebb1b792f6cb9370c5d17f6a4cd9215901d6a55cc4f894aedcc8b3221b074d835bba13d90a1d931924fd875686bed25ab414619915960fbcdeffc9d74116f961b5ee38329581be7e0e7ef373e42d01d7b4661745af95c757f7ca1cd77e3606ec8572a684076a71561d03bd03b312b6e8624137c0e58f0357a7b238bf739704e2b92f402cf285d2ffe2dd658d3f4cefd9ca0dd59cd8830c8681acbc6283d11ef20818d5bafda5c57c2b8fc290fa19b53c12d730fd2edbd452674478c9bb8da31ab92d4f55046fb0e42c2152a60316406283b587ad3ccc7f8ee53332221b7e96e55e7f9196bfabbe0c294124a14e07654ec08a27ec09f5a2c03db8f64840fbfdebaab3a00a85c0fb717df0d615436a5ebe9f6a9199ddc0e4a8bf165aa1eafb84cee9126cf2cd57404037f4bc285586736f2cc0867f466ed6987c91bf7983e3fad38a3b133e0aac7d7b39e7ede9a42065660f109bd4e56911dd8394afc376fab85e28a2b8d3e722536c6bf7e18d9244795952a290e0323578ef255d75c5f62862b305b62b578494b31635505f00ad3fc9a5e095fe493492c63fa645e7f0639da8222f5263a0acbf90491a265f37be6e971c23b680cacf502f01e746ef21b577adcd5bd300cc92fe92cb64ab2592d5e9b2ed3bf9a3ee67c193ec3414eb8b0a05a568d16c36f4143f7005e575e3d973099694294c5719bebfcc11cd4219d8d421eb5727b7e67d12bee53867987c9c36074c29bf311c042a18c20e1f6e9a7433a767dc37358675c33a5e03e5b0389dd89ddf7dd4b95dc16e6c5fa4c50201a50d0c3e9f2d25e7b96796f3a043fbd67ab9f7d0a6eb9fff346012adef8ade02561041b9e8bf8ce3125117c6a3929078e9e7bef2fefc9ca853ca24ce0f8ddc8bc130252f19fc84dfd7d503767baafdd54e9decbca40c74c87326c7774f30ed94519205ff27a01796a17f9428d883dae310d4aea9b9cc1d75756c88469813467417980336fddd7db54b1c8eda40200000000000000a92347c501ed42663b0f3be8d4a88227250c2fe86979701c0eec9e7eb6de77b32982e4c00ce12051cee68727a5b2fc5f917fa6b5911d795871f6307960463f47c51416d229fe9efe257336cdf038a8005d54ce436cd475817128f1f8e9b819fb8eb6dec70b988c1fb40a22fb7830bdff1994340432fedfdf66470c01dce4e30efdd348b2679f1ceefaa399e96b872ee28e7e78ddaef13b2a8655bc983d41127df2c29dba1a1cbb95071538521a90e0994e9e821674cdc81c0ccd52ccc0924e1476f82f83ef49599e5c209d46dbb2f9c2627e07f9bfd51dab549ed6b1f9b79f3e8dbc08d0cb0802ffdbdfcecc094695e6d30c6d5c39e0f412a7f3599d0838ff4b48021e71eadcf2fba7ccdae2fdb898b5a40caa72f65c4ff7de855a6c4b29ae7332f908ca4773d955b0581801781b3df6b9635d67e301085b5b99df8cb94818f0db77691777cc85860467f92097d4b531631c8ee001122b5548d7cd632c8c667bbff792b4bf851238c3bfe1a298440ea71151251f0a0299ea761247ba2c1199ff93de05d0ef2fbffcb387e59944fb9a568a7c3b1ade56f2a267826d5d4adf49cad5a03eba7e3a121d2070fc00d2b3bed5f04b2afaeebffcf9f10b9f15dcf787bee5e37b98fc3ac8156d2de7a29d837c41e7d574c6fd5e835ddd198848e559bd677b62724efae9b4165835c438b514552b365ced2ee247723c29e26e6d48f87685af9d92a9ff85c0ecef6fb06da05a2a9f1496ff9cc22143acaa8520c4c1c883d87df093dcdf6dd14306b8ca738caa1c2874ac6320c3a90162925f89254c62b6dab891bab32f686b8a8fc3db580decb8f6c7b7cc1ae064702e0959725ce1f1195e54aae28fcd4378666583bfa20cafb38b88efe0fc2d30a22024613d98800ff7372af61232012b5467d0fe39ed6d29712a7f399396ed688731f3e40145e083435f6aa14e64197d5417159e505d95f2e0a61ea4e4ab8ef4bb84461268e6b8ecaf4c8bcf1235927adfb0041307174699f6a1521ae7ad97dc192e5d792ec486809279153087db65194c7e017702f4cf143b4ce6f33f203f36143a6b15cd0179c79148edd316084a9ddd7a51623588fd2892c52432b30677c8a1cdba423c70ffee6fa098441aeee51bc0a0cd47cbfb77ba8ae55685ea53b2fd1826e2dd69c42b2be8a9e47d7c2e28c689dc41612b926ce2488ae625edf393237a137de960e3910c3801f8e629b7f6d25f18fae43b701579a7be6bff1dd8ec1d3b57ebc0ef0bcbba22e58490b92770078552793d63b6b3be06b19a875df6330a86b001b08af23586194da2e8510b6373ee8c98ec05991a95b4a67cf881507744d29defe3027ceafb6da09eb058a331a12d7e4327b4012ac794c09eb1ee1d382b6556c34cce3429e0998a7f57ead7dc57d8cdb6421372bf20d71cf6504a663157bcb4006ed44dd319de11ed24adbe5a525434aa6816a0b5389d829318cd05c84796ce86f077117f85e677a89fcab0413fde0efaa1e4daf47c2f56750c0a184d69799eb95590b15535220647c8d3e53d6613705ba6151fd880571f05d2ab5e769b02b2beafce738be368f82779ceed7854106a832d57013ebbac4d97f782ebd83a7e0a9d1aa8fc38995125afffdcfc46bd61410fb6347cb5e8e39791e8b07db0716917b10263b0186a98be42543a8d5e9e941673dc0997dfee7ce1046f03316fd400f7e50b49e68a34f409515e884e94f0ab3820af850e2b9d87f5907ead86d4d3c252e081bf351122febeb7b1e3f0488c923555fd393c5d9b0b18c413ee7f558768f989d2b1f3f5028041be44b563e3866fd15251cc693fb4bffcb5d1d03cb316d69a46134ecf8c64852851a64d607fa7f89be28d08beab76263991904d618d5a6e3b8828656b5b86f54486fde870319ae87a15bc4960c5908108f987e8131b51a17f8529a78fe76ac945f31cdaf6fb53155314f438cc9c1da88c2adb8046b51a21caacbf9d57efad5c4591b2e6680699da4c5269161fb7c37ea8aa99528ef95fe4431e797a5fa89e91c8140e17d943394dab79dc95d09361f57fe43047ceb1d8b21200d4c09aa418ef74c72d26fa03cfed9cdb217b5f6031f25f086e37746ccf4796f810ba50c94d830c8649a51d8d59253b8f443773f317d4994614a716facf3cf021b8b751a189a9a9fc3a3f952ca8b6235eb455cdb665ac555dad0d7501dee0951ac2fb147996212524d940c3858be5febbe7b0c2319e4401a5917c672ab86528257d9b9a258b32a3eb95d1631ac8ed4fe9e9e9091d79a4a16f2da746436570864be89bc95dc784ec5c5dc021a33d92219b448c06b8518395512cf58cc18594281c6c909a92d31f03d2519cca33d2803794a2e21a6b54d9c9c6707e7e8ff50dd03fe9349953dfffbe979ac06d8d7445ec0c5a485020b3fb5a1df8b31dc022c143353f57d5ff551f0000004a19ff3582da8bb7841db4f8b157a15ee46a7e32cd11574d2c8c7039ade415f537c7568ff771d73df3f550de8bd616ed80a206b58fe5b071ef77cf5d3e58ed1c05478e000000000000000000000000000000000000000000000000b55348d238a15640fde4f9593c0bcd5e366a56c14dac3e03aa21a14b352e03294c4ab12e77bc26e27a57191cf4cfb044d2fbf519c8648acf390dfccebafa4c50ec42e0fcd6e2c34e59929ae1968d556991c380bda844b1b375b668e08a9801019314ed3d5c8884f878f9d3da448ceff5ddaec5acb296f73951b320980fce2cf4cea4d577765a023bb17364dd161030d1c78b350fca75f9240c100a90dda2eab4d3c389"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:26 executing program 4: 12:23:26 executing program 1: 12:23:26 executing program 1: 12:23:26 executing program 1: 12:23:26 executing program 4: 12:23:26 executing program 1: 12:23:26 executing program 4: 12:23:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:26 executing program 1: 12:23:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:23:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 2560.950285] net_ratelimit: 18 callbacks suppressed [ 2560.950290] protocol 88fb is buggy, dev hsr_slave_0 [ 2560.960539] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.290637] device bridge_slave_1 left promiscuous mode [ 2561.296333] bridge0: port 2(bridge_slave_1) entered disabled state 12:23:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r2, &(0x7f0000002680)={'syz1', "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"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:26 executing program 1: 12:23:26 executing program 4: 12:23:27 executing program 1: [ 2561.351028] device bridge_slave_0 left promiscuous mode [ 2561.356578] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:27 executing program 4: 12:23:27 executing program 1: 12:23:27 executing program 4: 12:23:27 executing program 1: [ 2561.580426] device hsr_slave_1 left promiscuous mode [ 2561.619603] device hsr_slave_0 left promiscuous mode [ 2561.670121] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.675344] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.694385] team0 (unregistering): Port device team_slave_1 removed [ 2561.712450] team0 (unregistering): Port device team_slave_0 removed [ 2561.728993] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2561.755911] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2561.830195] protocol 88fb is buggy, dev hsr_slave_0 [ 2561.835357] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.867156] bond0 (unregistering): Released all slaves [ 2562.240155] protocol 88fb is buggy, dev hsr_slave_0 [ 2562.245352] protocol 88fb is buggy, dev hsr_slave_1 [ 2563.030618] protocol 88fb is buggy, dev hsr_slave_0 [ 2563.035736] protocol 88fb is buggy, dev hsr_slave_1 [ 2563.851603] IPVS: ftp: loaded support on port[0] = 21 [ 2564.779458] chnl_net:caif_netlink_parms(): no params data found [ 2564.818742] bridge0: port 1(bridge_slave_0) entered blocking state [ 2564.825486] bridge0: port 1(bridge_slave_0) entered disabled state [ 2564.834249] device bridge_slave_0 entered promiscuous mode [ 2564.841946] bridge0: port 2(bridge_slave_1) entered blocking state [ 2564.848503] bridge0: port 2(bridge_slave_1) entered disabled state [ 2564.856283] device bridge_slave_1 entered promiscuous mode [ 2564.873763] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2564.883037] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2564.901863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2564.909248] team0: Port device team_slave_0 added [ 2564.915151] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2564.922533] team0: Port device team_slave_1 added [ 2564.928032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2564.935865] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2565.002925] device hsr_slave_0 entered promiscuous mode [ 2565.040822] device hsr_slave_1 entered promiscuous mode [ 2565.081463] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2565.089120] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2565.106335] bridge0: port 2(bridge_slave_1) entered blocking state [ 2565.112753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2565.119367] bridge0: port 1(bridge_slave_0) entered blocking state [ 2565.126396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2565.158715] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2565.165344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2565.175275] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2565.186394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2565.194057] bridge0: port 1(bridge_slave_0) entered disabled state [ 2565.201412] bridge0: port 2(bridge_slave_1) entered disabled state [ 2565.211674] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2565.217849] 8021q: adding VLAN 0 to HW filter on device team0 [ 2565.227775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2565.235980] bridge0: port 1(bridge_slave_0) entered blocking state [ 2565.242577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2565.252897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2565.261829] bridge0: port 2(bridge_slave_1) entered blocking state [ 2565.268189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2565.291733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2565.299505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2565.307657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2565.315869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2565.328692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2565.339101] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2565.346142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2565.359616] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2565.368045] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2565.375474] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2565.386908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2565.760775] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2565.990226] net_ratelimit: 18 callbacks suppressed [ 2565.990232] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.000446] protocol 88fb is buggy, dev hsr_slave_1 [ 2566.390392] protocol 88fb is buggy, dev hsr_slave_0 [ 2566.395476] protocol 88fb is buggy, dev hsr_slave_1 [ 2566.662301] audit: type=1804 audit(1574166212.270:1838): pid=8322 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir214710132/syzkaller.oEqnwK/0/bus" dev="sda1" ino=17724 res=1 12:23:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:32 executing program 1: 12:23:32 executing program 4: 12:23:32 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 12:23:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0x0) 12:23:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r2, &(0x7f0000002680)={'syz1', "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"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:32 executing program 4: 12:23:32 executing program 1: 12:23:32 executing program 1: 12:23:32 executing program 4: 12:23:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x0, 0x0) 12:23:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x9}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x2}}, 0xe8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc2(0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)=@v2={0x2, @adiantum, 0x0, [], "e3c2dd56318033732aa45f688e0bb4ca"}) 12:23:32 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0xfffffffd, 0x400, 0xfffffff9, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x2000}) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000300)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="2ce05ac02c40121f2f73d7", 0xb, 0xfffffffffffffffb) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) 12:23:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2567.190962] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.196678] protocol 88fb is buggy, dev hsr_slave_1 [ 2567.242195] audit: type=1804 audit(1574166212.840:1839): pid=8350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir696153893/syzkaller.BeQxcm/35/bus" dev="sda1" ino=17720 res=1 [ 2567.538305] audit: type=1804 audit(1574166213.140:1840): pid=8350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir696153893/syzkaller.BeQxcm/35/bus" dev="sda1" ino=17720 res=1 [ 2567.830126] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.835739] protocol 88fb is buggy, dev hsr_slave_1 [ 2567.910138] protocol 88fb is buggy, dev hsr_slave_0 [ 2567.915460] protocol 88fb is buggy, dev hsr_slave_1 12:23:33 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 12:23:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:23:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r2, &(0x7f0000002680)={'syz1', "b50fd98fb8cb1f648891eac8a1a48991e90e328498373d6a5c1a84da110bc9c96b0850c23581c929c38acea9979fc69a9d52e067419bcc4b48345b6341bf8933d8ddeb74ba64b08366bb675660f7bc1c43762e6ff5392ff4babbadea6b6a925939d197dccc86348ecc2d482c55112e502752817874a8a5b8b8455fd6adf2805ce5eb39b2d112142340476e04d9211f51ca10dfc4ba6a7e43d9ce6d098921efe04e25ada4d15974b3872d5f49ee8301a9e72a6ac3c1cab2e166e97fc939427e3838d671fec8ff4e655b40dde38e028a36685edb954e6c1219d117f491c95fffc00825d73eac76e87222c8a70a562a37d3cd8cac2fdd783844351a1877a89d662421ed3c68655a0fa65bf790747f971dfe5211bf2b19a95c6fb9a9f9924c863da8cd8b5bd60fea618b98c0d91b0ab210c4a0c35947b9098e7c5a8e1bb3967f079cdc26d2fb297611e6c33414e25498832580a36ba832c9a1aa21b69a75a2b93a4cb2201b43ff4b5e138a01f6a89d22fc3f77dc41250d8bc83804e2a320c0d963bf58d697cc963311ef30c562c1c69cf0ac29fb0194e232eec6c7d8efc8969eed5b3d7ce61c0b4ebc96fd23f7f66c82871a4347126c16228e1712ee8df55337b441f31d61e1164701821f2a4d512c2611039e36d2964289ba5fc74a4f8bb6df13cb15334667e36e86fdaa5e709e8e352706cec60222875ce90fb8a023c78e359dbeffebb28113fdc4eb648b3686f229ec505023ed8426c429eddd41d31785c90b762442aeebfb2a580689c4560add1df9c1a291631a6840bc6b5881fcd89140503f5947d4fbce3aa805177f4399b61fcd4102f484d2118cf5de61dd9d7cf57252d6abb3ce39345a322473512e2a3c0b7e3b1a2b4a24ab5580d7af1aab81280fa24a10ac6d8bc92a26f4d9a0c08f2002ba87d08cfc5f187c58edc5c74ddc178e5207866222a174896115a12d6a83c6b512f6f5e0143ae2b1f7107d770726d1cf78837c81e72f25cf910d7a51efae43902dd831589d787fa88a7746db8a4f88e9900db9caab70a219c59c274769a72add8bd7cc7ec2689f14ecc0384546fc55c9f398dab8626d75a075db39bd54abf5ee7f8b42009499ac7dc186b5176d9c6f71f22592ce5c255a98c3f1ed2ca62e5763ad9978af781649d7c0a6729cdd2722d2afc320a1526b403f7f68e140f31ea0394ba769901aa1877a6a857e4fc478b4cf9676de6919a5bf4df55b387083f97386e6d16ec9b1204af4854ccdd0c1e8d3369dcbc257d417af072b8fc111a64441012badfcfe681d1b1e3bb55106d828d986ea788163d6ae10112b71a6a00987a344e03194df42d88b39612bb5af2f7d36362228d351a38492ee0ad45b269c41c092e42768a546e723bf32c1f23af31e3a692bd18579dabebd3d4eb068fc81614a5efd5642834452b864c1dbaecec3ea44f0ba5834d3a45c688a6ddce225d00c9a22b694933c1bd49bac780ea9d8932dbbabaf1cf7584c5af756cf393c741e853b3926adf638541015b5550d0b0a163dad3d4fa587a995243a11318b784540f1453d4a1fc809050882543df74a921b122e9e4c66cf11b4d6b6a1a01fe799cced406ae93ad29c0c8709c27ffc0a131cb4ad4ba3fa0f1023db9f05cdf7405c25723d586b728411bee93785914085f4d11c3f48f728895f4201d33aec7db8468aaa39667bc9d95f0152a38263021d596e42bcfd7604a5e60d6d1496b79c46e0fa54298bb7f9d8eefd24aca29154e40793280aebb9d8010965d608257ab9917f375237b6c119964dc6b7d54c8f5637cb1e22d5d4bf13f76fedc7196e77b7d08fe2fdcdf5e7cad6abdaca2d3802f059630cff3169b4c40fe42cc9172cd9503f02760bac63352762d2e39be2e1e6dcf307208f2755ffc2d43ea1fc3af2402dda8acc7fdcc22a10deccf091790305ca6631a8ae66e6b32559865db0fd71d3c9394a27b5beac5fd21be67e51452893c6b2b5f5f248d92ddb27fe433bdf6c6f1875b98b32fe850b4a6dabee4bfd72b59118e1ae91b37cd7d454c505dc8a70d038aa150f72a3b9b27ca6d923bab6a3d1625c2160306a865bd6024ae3fac62a693470e60b8e8db083c3d175a7f6414a34825f9db5110330b747bbe9944266adce3e510577a1772d5d99d7692680f444dbccbf69a710d8222f437d6dfbd7c801bd36f64153c167b50654f23a4779007a992c67000d1934ef1ebb1b792f6cb9370c5d17f6a4cd9215901d6a55cc4f894aedcc8b3221b074d835bba13d90a1d931924fd875686bed25ab414619915960fbcdeffc9d74116f961b5ee38329581be7e0e7ef373e42d01d7b4661745af95c757f7ca1cd77e3606ec8572a684076a71561d03bd03b312b6e8624137c0e58f0357a7b238bf739704e2b92f402cf285d2ffe2dd658d3f4cefd9ca0dd59cd8830c8681acbc6283d11ef20818d5bafda5c57c2b8fc290fa19b53c12d730fd2edbd452674478c9bb8da31ab92d4f55046fb0e42c2152a60316406283b587ad3ccc7f8ee53332221b7e96e55e7f9196bfabbe0c294124a14e07654ec08a27ec09f5a2c03db8f64840fbfdebaab3a00a85c0fb717df0d615436a5ebe9f6a9199ddc0e4a8bf165aa1eafb84cee9126cf2cd57404037f4bc285586736f2cc0867f466ed6987c91bf7983e3fad38a3b133e0aac7d7b39e7ede9a42065660f109bd4e56911dd8394afc376fab85e28a2b8d3e722536c6bf7e18d9244795952a290e0323578ef255d75c5f62862b305b62b578494b31635505f00ad3fc9a5e095fe493492c63fa645e7f0639da8222f5263a0acbf90491a265f37be6e971c23b680cacf502f01e746ef21b577adcd5bd300cc92fe92cb64ab2592d5e9b2ed3bf9a3ee67c193ec3414eb8b0a05a568d16c36f4143f7005e575e3d973099694294c5719bebfcc11cd4219d8d421eb5727b7e67d12bee53867987c9c36074c29bf311c042a18c20e1f6e9a7433a767dc37358675c33a5e03e5b0389dd89ddf7dd4b95dc16e6c5fa4c50201a50d0c3e9f2d25e7b96796f3a043fbd67ab9f7d0a6eb9fff346012adef8ade02561041b9e8bf8ce3125117c6a3929078e9e7bef2fefc9ca853ca24ce0f8ddc8bc130252f19fc84dfd7d503767baafdd54e9decbca40c74c87326c7774f30ed94519205ff27a01796a17f9428d883dae310d4aea9b9cc1d75756c88469813467417980336fddd7db54b1c8eda40200000000000000a92347c501ed42663b0f3be8d4a88227250c2fe86979701c0eec9e7eb6de77b32982e4c00ce12051cee68727a5b2fc5f917fa6b5911d795871f6307960463f47c51416d229fe9efe257336cdf038a8005d54ce436cd475817128f1f8e9b819fb8eb6dec70b988c1fb40a22fb7830bdff1994340432fedfdf66470c01dce4e30efdd348b2679f1ceefaa399e96b872ee28e7e78ddaef13b2a8655bc983d41127df2c29dba1a1cbb95071538521a90e0994e9e821674cdc81c0ccd52ccc0924e1476f82f83ef49599e5c209d46dbb2f9c2627e07f9bfd51dab549ed6b1f9b79f3e8dbc08d0cb0802ffdbdfcecc094695e6d30c6d5c39e0f412a7f3599d0838ff4b48021e71eadcf2fba7ccdae2fdb898b5a40caa72f65c4ff7de855a6c4b29ae7332f908ca4773d955b0581801781b3df6b9635d67e301085b5b99df8cb94818f0db77691777cc85860467f92097d4b531631c8ee001122b5548d7cd632c8c667bbff792b4bf851238c3bfe1a298440ea71151251f0a0299ea761247ba2c1199ff93de05d0ef2fbffcb387e59944fb9a568a7c3b1ade56f2a267826d5d4adf49cad5a03eba7e3a121d2070fc00d2b3bed5f04b2afaeebffcf9f10b9f15dcf787bee5e37b98fc3ac8156d2de7a29d837c41e7d574c6fd5e835ddd198848e559bd677b62724efae9b4165835c438b514552b365ced2ee247723c29e26e6d48f87685af9d92a9ff85c0ecef6fb06da05a2a9f1496ff9cc22143acaa8520c4c1c883d87df093dcdf6dd14306b8ca738caa1c2874ac6320c3a90162925f89254c62b6dab891bab32f686b8a8fc3db580decb8f6c7b7cc1ae064702e0959725ce1f1195e54aae28fcd4378666583bfa20cafb38b88efe0fc2d30a22024613d98800ff7372af61232012b5467d0fe39ed6d29712a7f399396ed688731f3e40145e083435f6aa14e64197d5417159e505d95f2e0a61ea4e4ab8ef4bb84461268e6b8ecaf4c8bcf1235927adfb0041307174699f6a1521ae7ad97dc192e5d792ec486809279153087db65194c7e017702f4cf143b4ce6f33f203f36143a6b15cd0179c79148edd316084a9ddd7a51623588fd2892c52432b30677c8a1cdba423c70ffee6fa098441aeee51bc0a0cd47cbfb77ba8ae55685ea53b2fd1826e2dd69c42b2be8a9e47d7c2e28c689dc41612b926ce2488ae625edf393237a137de960e3910c3801f8e629b7f6d25f18fae43b701579a7be6bff1dd8ec1d3b57ebc0ef0bcbba22e58490b92770078552793d63b6b3be06b19a875df6330a86b001b08af23586194da2e8510b6373ee8c98ec05991a95b4a67cf881507744d29defe3027ceafb6da09eb058a331a12d7e4327b4012ac794c09eb1ee1d382b6556c34cce3429e0998a7f57ead7dc57d8cdb6421372bf20d71cf6504a663157bcb4006ed44dd319de11ed24adbe5a525434aa6816a0b5389d829318cd05c84796ce86f077117f85e677a89fcab0413fde0efaa1e4daf47c2f56750c0a184d69799eb95590b15535220647c8d3e53d6613705ba6151fd880571f05d2ab5e769b02b2beafce738be368f82779ceed7854106a832d57013ebbac4d97f782ebd83a7e0a9d1aa8fc38995125afffdcfc46bd61410fb6347cb5e8e39791e8b07db0716917b10263b0186a98be42543a8d5e9e941673dc0997dfee7ce1046f03316fd400f7e50b49e68a34f409515e884e94f0ab3820af850e2b9d87f5907ead86d4d3c252e081bf351122febeb7b1e3f0488c923555fd393c5d9b0b18c413ee7f558768f989d2b1f3f5028041be44b563e3866fd15251cc693fb4bffcb5d1d03cb316d69a46134ecf8c64852851a64d607fa7f89be28d08beab76263991904d618d5a6e3b8828656b5b86f54486fde870319ae87a15bc4960c5908108f987e8131b51a17f8529a78fe76ac945f31cdaf6fb53155314f438cc9c1da88c2adb8046b51a21caacbf9d57efad5c4591b2e6680699da4c5269161fb7c37ea8aa99528ef95fe4431e797a5fa89e91c8140e17d943394dab79dc95d09361f57fe43047ceb1d8b21200d4c09aa418ef74c72d26fa03cfed9cdb217b5f6031f25f086e37746ccf4796f810ba50c94d830c8649a51d8d59253b8f443773f317d4994614a716facf3cf021b8b751a189a9a9fc3a3f952ca8b6235eb455cdb665ac555dad0d7501dee0951ac2fb147996212524d940c3858be5febbe7b0c2319e4401a5917c672ab86528257d9b9a258b32a3eb95d1631ac8ed4fe9e9e9091d79a4a16f2da746436570864be89bc95dc784ec5c5dc021a33d92219b448c06b8518395512cf58cc18594281c6c909a92d31f03d2519cca33d2803794a2e21a6b54d9c9c6707e7e8ff50dd03fe9349953dfffbe979ac06d8d7445ec0c5a485020b3fb5a1df8b31dc022c143353f57d5ff551f0000004a19ff3582da8bb7841db4f8b157a15ee46a7e32cd11574d2c8c7039ade415f537c7568ff771d73df3f550de8bd616ed80a206b58fe5b071ef77cf5d3e58ed1c05478e000000000000000000000000000000000000000000000000b55348d238a15640fde4f9593c0bcd5e366a56c14dac3e03aa21a14b352e03294c4ab12e77bc26e27a57191cf4cfb044d2fbf519c8648acf390dfccebafa4c50ec42e0fcd6e2c34e59929ae1968d556991c380bda844b1b375b668e08a9801019314ed3d5c8884f878f9d3da448ceff5ddaec5acb296f73951b320980fce2cf4cea4d577765a023bb17364dd161030d1c78b350fca75f9240c100a90dda2eab4d3c389"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:33 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r0 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) read$eventfd(r2, &(0x7f00000003c0), 0x8) fallocate(r0, 0xe, 0x6, 0xffffffffffff5a11) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0xfffffffd, 0x400, 0xfffffff9, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x2000}) syz_open_pts(r5, 0x0) close(r5) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000300)) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r6 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r6, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="2ce05ac02c40121f2f73d7", 0xb, 0xfffffffffffffffb) r7 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, 0x0) ftruncate(r3, 0x800fe) sendfile(r6, r7, 0x0, 0x8000fffffffe) 12:23:33 executing program 1: getdents64(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./bus\x00', 0x3469a0ba8920983d, 0x1) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000002c0)={0x1, 0x1, 0x1000, 0x49, &(0x7f00000001c0)="0ef40dc2c65b2abed8931f78a0fb54980d8826ea380ff9b30fadb8633a943add97eed6b574884a67165069a31a645082e0c8ddef34741774dedb249e9606d75cba047446d9bc4ea026", 0x0, 0x0, &(0x7f0000000240)}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) umount2(0x0, 0x0) getdents64(r1, &(0x7f0000000a80)=""/4082, 0x652) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@ipv4={[], [], @empty}, 0x8b, 0x2, 0x100000003, 0x1, 0x0, 0x0, 0x1a0}, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000380)) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) [ 2568.170563] device bridge_slave_1 left promiscuous mode [ 2568.179535] bridge0: port 2(bridge_slave_1) entered disabled state [ 2568.214840] audit: type=1804 audit(1574166213.820:1841): pid=8363 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir696153893/syzkaller.BeQxcm/36/bus" dev="sda1" ino=17738 res=1 [ 2568.282107] device bridge_slave_0 left promiscuous mode [ 2568.287737] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:34 executing program 4: creat(&(0x7f0000000000)='./bus\x00', 0x4) io_setup(0x0, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x840100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x13b) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) [ 2568.566149] device hsr_slave_1 left promiscuous mode [ 2568.604713] device hsr_slave_0 left promiscuous mode [ 2568.656927] team0 (unregistering): Port device team_slave_1 removed [ 2568.673699] team0 (unregistering): Port device team_slave_0 removed [ 2568.687000] bond0 (unregistering): Releasing backup interface bond_slave_1 12:23:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect(0xffffffffffffffff, 0x0, 0x0) fallocate(r0, 0x11, 0x0, 0x100000001) 12:23:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:23:34 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2568.755882] bond0 (unregistering): Releasing backup interface bond_slave_0 12:23:34 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 2568.839554] bond0 (unregistering): Released all slaves 12:23:34 executing program 1: [ 2570.561534] IPVS: ftp: loaded support on port[0] = 21 [ 2571.350198] net_ratelimit: 12 callbacks suppressed [ 2571.350204] protocol 88fb is buggy, dev hsr_slave_0 [ 2571.360509] protocol 88fb is buggy, dev hsr_slave_1 [ 2571.499559] chnl_net:caif_netlink_parms(): no params data found [ 2571.536470] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.543161] bridge0: port 1(bridge_slave_0) entered disabled state [ 2571.550368] device bridge_slave_0 entered promiscuous mode [ 2571.558421] bridge0: port 2(bridge_slave_1) entered blocking state [ 2571.564924] bridge0: port 2(bridge_slave_1) entered disabled state [ 2571.571988] device bridge_slave_1 entered promiscuous mode [ 2571.590449] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2571.599698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2571.618500] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2571.625832] team0: Port device team_slave_0 added [ 2571.631604] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2571.638706] team0: Port device team_slave_1 added [ 2571.644456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2571.652480] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2571.712449] device hsr_slave_0 entered promiscuous mode [ 2571.780693] device hsr_slave_1 entered promiscuous mode [ 2571.821148] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2571.828677] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2571.844575] bridge0: port 2(bridge_slave_1) entered blocking state [ 2571.851030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2571.861155] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.867720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2571.898619] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2571.905345] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2571.913993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2571.924971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2571.932235] bridge0: port 1(bridge_slave_0) entered disabled state [ 2571.938862] bridge0: port 2(bridge_slave_1) entered disabled state [ 2571.948843] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2571.954999] 8021q: adding VLAN 0 to HW filter on device team0 [ 2571.965443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2571.973223] bridge0: port 1(bridge_slave_0) entered blocking state [ 2571.979565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2571.989711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2571.998102] bridge0: port 2(bridge_slave_1) entered blocking state [ 2572.004527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2572.021746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2572.029428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2572.041215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2572.051032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2572.064342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2572.075948] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2572.080149] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.082344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2572.086992] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.099280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2572.115881] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2572.125481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2572.132465] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2572.144421] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2572.200256] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.205361] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.240241] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.245376] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.320193] protocol 88fb is buggy, dev hsr_slave_0 [ 2572.325321] protocol 88fb is buggy, dev hsr_slave_1 [ 2572.490797] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2573.415828] audit: type=1804 audit(1574166219.020:1842): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir872704067/syzkaller.2OeeBI/0/bus" dev="sda1" ino=16604 res=1 12:23:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) fallocate(r1, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r1, &(0x7f0000002680)={'syz1', "b50fd98fb8cb1f648891eac8a1a48991e90e328498373d6a5c1a84da110bc9c96b0850c23581c929c38acea9979fc69a9d52e067419bcc4b48345b6341bf8933d8ddeb74ba64b08366bb675660f7bc1c43762e6ff5392ff4babbadea6b6a925939d197dccc86348ecc2d482c55112e502752817874a8a5b8b8455fd6adf2805ce5eb39b2d112142340476e04d9211f51ca10dfc4ba6a7e43d9ce6d098921efe04e25ada4d15974b3872d5f49ee8301a9e72a6ac3c1cab2e166e97fc939427e3838d671fec8ff4e655b40dde38e028a36685edb954e6c1219d117f491c95fffc00825d73eac76e87222c8a70a562a37d3cd8cac2fdd783844351a1877a89d662421ed3c68655a0fa65bf790747f971dfe5211bf2b19a95c6fb9a9f9924c863da8cd8b5bd60fea618b98c0d91b0ab210c4a0c35947b9098e7c5a8e1bb3967f079cdc26d2fb297611e6c33414e25498832580a36ba832c9a1aa21b69a75a2b93a4cb2201b43ff4b5e138a01f6a89d22fc3f77dc41250d8bc83804e2a320c0d963bf58d697cc963311ef30c562c1c69cf0ac29fb0194e232eec6c7d8efc8969eed5b3d7ce61c0b4ebc96fd23f7f66c82871a4347126c16228e1712ee8df55337b441f31d61e1164701821f2a4d512c2611039e36d2964289ba5fc74a4f8bb6df13cb15334667e36e86fdaa5e709e8e352706cec60222875ce90fb8a023c78e359dbeffebb28113fdc4eb648b3686f229ec505023ed8426c429eddd41d31785c90b762442aeebfb2a580689c4560add1df9c1a291631a6840bc6b5881fcd89140503f5947d4fbce3aa805177f4399b61fcd4102f484d2118cf5de61dd9d7cf57252d6abb3ce39345a322473512e2a3c0b7e3b1a2b4a24ab5580d7af1aab81280fa24a10ac6d8bc92a26f4d9a0c08f2002ba87d08cfc5f187c58edc5c74ddc178e5207866222a174896115a12d6a83c6b512f6f5e0143ae2b1f7107d770726d1cf78837c81e72f25cf910d7a51efae43902dd831589d787fa88a7746db8a4f88e9900db9caab70a219c59c274769a72add8bd7cc7ec2689f14ecc0384546fc55c9f398dab8626d75a075db39bd54abf5ee7f8b42009499ac7dc186b5176d9c6f71f22592ce5c255a98c3f1ed2ca62e5763ad9978af781649d7c0a6729cdd2722d2afc320a1526b403f7f68e140f31ea0394ba769901aa1877a6a857e4fc478b4cf9676de6919a5bf4df55b387083f97386e6d16ec9b1204af4854ccdd0c1e8d3369dcbc257d417af072b8fc111a64441012badfcfe681d1b1e3bb55106d828d986ea788163d6ae10112b71a6a00987a344e03194df42d88b39612bb5af2f7d36362228d351a38492ee0ad45b269c41c092e42768a546e723bf32c1f23af31e3a692bd18579dabebd3d4eb068fc81614a5efd5642834452b864c1dbaecec3ea44f0ba5834d3a45c688a6ddce225d00c9a22b694933c1bd49bac780ea9d8932dbbabaf1cf7584c5af756cf393c741e853b3926adf638541015b5550d0b0a163dad3d4fa587a995243a11318b784540f1453d4a1fc809050882543df74a921b122e9e4c66cf11b4d6b6a1a01fe799cced406ae93ad29c0c8709c27ffc0a131cb4ad4ba3fa0f1023db9f05cdf7405c25723d586b728411bee93785914085f4d11c3f48f728895f4201d33aec7db8468aaa39667bc9d95f0152a38263021d596e42bcfd7604a5e60d6d1496b79c46e0fa54298bb7f9d8eefd24aca29154e40793280aebb9d8010965d608257ab9917f375237b6c119964dc6b7d54c8f5637cb1e22d5d4bf13f76fedc7196e77b7d08fe2fdcdf5e7cad6abdaca2d3802f059630cff3169b4c40fe42cc9172cd9503f02760bac63352762d2e39be2e1e6dcf307208f2755ffc2d43ea1fc3af2402dda8acc7fdcc22a10deccf091790305ca6631a8ae66e6b32559865db0fd71d3c9394a27b5beac5fd21be67e51452893c6b2b5f5f248d92ddb27fe433bdf6c6f1875b98b32fe850b4a6dabee4bfd72b59118e1ae91b37cd7d454c505dc8a70d038aa150f72a3b9b27ca6d923bab6a3d1625c2160306a865bd6024ae3fac62a693470e60b8e8db083c3d175a7f6414a34825f9db5110330b747bbe9944266adce3e510577a1772d5d99d7692680f444dbccbf69a710d8222f437d6dfbd7c801bd36f64153c167b50654f23a4779007a992c67000d1934ef1ebb1b792f6cb9370c5d17f6a4cd9215901d6a55cc4f894aedcc8b3221b074d835bba13d90a1d931924fd875686bed25ab414619915960fbcdeffc9d74116f961b5ee38329581be7e0e7ef373e42d01d7b4661745af95c757f7ca1cd77e3606ec8572a684076a71561d03bd03b312b6e8624137c0e58f0357a7b238bf739704e2b92f402cf285d2ffe2dd658d3f4cefd9ca0dd59cd8830c8681acbc6283d11ef20818d5bafda5c57c2b8fc290fa19b53c12d730fd2edbd452674478c9bb8da31ab92d4f55046fb0e42c2152a60316406283b587ad3ccc7f8ee53332221b7e96e55e7f9196bfabbe0c294124a14e07654ec08a27ec09f5a2c03db8f64840fbfdebaab3a00a85c0fb717df0d615436a5ebe9f6a9199ddc0e4a8bf165aa1eafb84cee9126cf2cd57404037f4bc285586736f2cc0867f466ed6987c91bf7983e3fad38a3b133e0aac7d7b39e7ede9a42065660f109bd4e56911dd8394afc376fab85e28a2b8d3e722536c6bf7e18d9244795952a290e0323578ef255d75c5f62862b305b62b578494b31635505f00ad3fc9a5e095fe493492c63fa645e7f0639da8222f5263a0acbf90491a265f37be6e971c23b680cacf502f01e746ef21b577adcd5bd300cc92fe92cb64ab2592d5e9b2ed3bf9a3ee67c193ec3414eb8b0a05a568d16c36f4143f7005e575e3d973099694294c5719bebfcc11cd4219d8d421eb5727b7e67d12bee53867987c9c36074c29bf311c042a18c20e1f6e9a7433a767dc37358675c33a5e03e5b0389dd89ddf7dd4b95dc16e6c5fa4c50201a50d0c3e9f2d25e7b96796f3a043fbd67ab9f7d0a6eb9fff346012adef8ade02561041b9e8bf8ce3125117c6a3929078e9e7bef2fefc9ca853ca24ce0f8ddc8bc130252f19fc84dfd7d503767baafdd54e9decbca40c74c87326c7774f30ed94519205ff27a01796a17f9428d883dae310d4aea9b9cc1d75756c88469813467417980336fddd7db54b1c8eda40200000000000000a92347c501ed42663b0f3be8d4a88227250c2fe86979701c0eec9e7eb6de77b32982e4c00ce12051cee68727a5b2fc5f917fa6b5911d795871f6307960463f47c51416d229fe9efe257336cdf038a8005d54ce436cd475817128f1f8e9b819fb8eb6dec70b988c1fb40a22fb7830bdff1994340432fedfdf66470c01dce4e30efdd348b2679f1ceefaa399e96b872ee28e7e78ddaef13b2a8655bc983d41127df2c29dba1a1cbb95071538521a90e0994e9e821674cdc81c0ccd52ccc0924e1476f82f83ef49599e5c209d46dbb2f9c2627e07f9bfd51dab549ed6b1f9b79f3e8dbc08d0cb0802ffdbdfcecc094695e6d30c6d5c39e0f412a7f3599d0838ff4b48021e71eadcf2fba7ccdae2fdb898b5a40caa72f65c4ff7de855a6c4b29ae7332f908ca4773d955b0581801781b3df6b9635d67e301085b5b99df8cb94818f0db77691777cc85860467f92097d4b531631c8ee001122b5548d7cd632c8c667bbff792b4bf851238c3bfe1a298440ea71151251f0a0299ea761247ba2c1199ff93de05d0ef2fbffcb387e59944fb9a568a7c3b1ade56f2a267826d5d4adf49cad5a03eba7e3a121d2070fc00d2b3bed5f04b2afaeebffcf9f10b9f15dcf787bee5e37b98fc3ac8156d2de7a29d837c41e7d574c6fd5e835ddd198848e559bd677b62724efae9b4165835c438b514552b365ced2ee247723c29e26e6d48f87685af9d92a9ff85c0ecef6fb06da05a2a9f1496ff9cc22143acaa8520c4c1c883d87df093dcdf6dd14306b8ca738caa1c2874ac6320c3a90162925f89254c62b6dab891bab32f686b8a8fc3db580decb8f6c7b7cc1ae064702e0959725ce1f1195e54aae28fcd4378666583bfa20cafb38b88efe0fc2d30a22024613d98800ff7372af61232012b5467d0fe39ed6d29712a7f399396ed688731f3e40145e083435f6aa14e64197d5417159e505d95f2e0a61ea4e4ab8ef4bb84461268e6b8ecaf4c8bcf1235927adfb0041307174699f6a1521ae7ad97dc192e5d792ec486809279153087db65194c7e017702f4cf143b4ce6f33f203f36143a6b15cd0179c79148edd316084a9ddd7a51623588fd2892c52432b30677c8a1cdba423c70ffee6fa098441aeee51bc0a0cd47cbfb77ba8ae55685ea53b2fd1826e2dd69c42b2be8a9e47d7c2e28c689dc41612b926ce2488ae625edf393237a137de960e3910c3801f8e629b7f6d25f18fae43b701579a7be6bff1dd8ec1d3b57ebc0ef0bcbba22e58490b92770078552793d63b6b3be06b19a875df6330a86b001b08af23586194da2e8510b6373ee8c98ec05991a95b4a67cf881507744d29defe3027ceafb6da09eb058a331a12d7e4327b4012ac794c09eb1ee1d382b6556c34cce3429e0998a7f57ead7dc57d8cdb6421372bf20d71cf6504a663157bcb4006ed44dd319de11ed24adbe5a525434aa6816a0b5389d829318cd05c84796ce86f077117f85e677a89fcab0413fde0efaa1e4daf47c2f56750c0a184d69799eb95590b15535220647c8d3e53d6613705ba6151fd880571f05d2ab5e769b02b2beafce738be368f82779ceed7854106a832d57013ebbac4d97f782ebd83a7e0a9d1aa8fc38995125afffdcfc46bd61410fb6347cb5e8e39791e8b07db0716917b10263b0186a98be42543a8d5e9e941673dc0997dfee7ce1046f03316fd400f7e50b49e68a34f409515e884e94f0ab3820af850e2b9d87f5907ead86d4d3c252e081bf351122febeb7b1e3f0488c923555fd393c5d9b0b18c413ee7f558768f989d2b1f3f5028041be44b563e3866fd15251cc693fb4bffcb5d1d03cb316d69a46134ecf8c64852851a64d607fa7f89be28d08beab76263991904d618d5a6e3b8828656b5b86f54486fde870319ae87a15bc4960c5908108f987e8131b51a17f8529a78fe76ac945f31cdaf6fb53155314f438cc9c1da88c2adb8046b51a21caacbf9d57efad5c4591b2e6680699da4c5269161fb7c37ea8aa99528ef95fe4431e797a5fa89e91c8140e17d943394dab79dc95d09361f57fe43047ceb1d8b21200d4c09aa418ef74c72d26fa03cfed9cdb217b5f6031f25f086e37746ccf4796f810ba50c94d830c8649a51d8d59253b8f443773f317d4994614a716facf3cf021b8b751a189a9a9fc3a3f952ca8b6235eb455cdb665ac555dad0d7501dee0951ac2fb147996212524d940c3858be5febbe7b0c2319e4401a5917c672ab86528257d9b9a258b32a3eb95d1631ac8ed4fe9e9e9091d79a4a16f2da746436570864be89bc95dc784ec5c5dc021a33d92219b448c06b8518395512cf58cc18594281c6c909a92d31f03d2519cca33d2803794a2e21a6b54d9c9c6707e7e8ff50dd03fe9349953dfffbe979ac06d8d7445ec0c5a485020b3fb5a1df8b31dc022c143353f57d5ff551f0000004a19ff3582da8bb7841db4f8b157a15ee46a7e32cd11574d2c8c7039ade415f537c7568ff771d73df3f550de8bd616ed80a206b58fe5b071ef77cf5d3e58ed1c05478e000000000000000000000000000000000000000000000000b55348d238a15640fde4f9593c0bcd5e366a56c14dac3e03aa21a14b352e03294c4ab12e77bc26e27a57191cf4cfb044d2fbf519c8648acf390dfccebafa4c50ec42e0fcd6e2c34e59929ae1968d556991c380bda844b1b375b668e08a9801019314ed3d5c8884f878f9d3da448ceff5ddaec5acb296f73951b320980fce2cf4cea4d577765a023bb17364dd161030d1c78b350fca75f9240c100a90dda2eab4d3c389"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:39 executing program 4: 12:23:39 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) gettid() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x15) syz_open_dev$vcsn(0x0, 0x0, 0x10000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 12:23:39 executing program 1: 12:23:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0x0) 12:23:39 executing program 4: connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) fallocate(r0, 0x11, 0x0, 0x100000001) 12:23:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) creat(0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x8) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, 0x0, 0x0) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) recvmmsg(r3, &(0x7f0000005540)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)=""/34, 0x22}, 0x400}, {{&(0x7f0000001500)=@caif, 0x80, 0x0, 0x0, &(0x7f0000001640)=""/227, 0xe3}, 0x2}, {{&(0x7f0000001740)=@nl, 0x80, &(0x7f0000001880)=[{&(0x7f00000017c0)=""/182, 0xb6}], 0x1, &(0x7f00000018c0)=""/92, 0x5c}}, {{&(0x7f0000001940)=@nfc_llcp, 0x80, &(0x7f0000003d80)=[{0x0}, {&(0x7f0000001a40)=""/115, 0x73}, {&(0x7f0000001ac0)=""/12, 0xc}, {&(0x7f0000005700)=""/4109, 0x100d}, {0x0}, {&(0x7f0000002bc0)=""/248, 0xf8}, {&(0x7f0000002cc0)=""/152, 0x98}, {&(0x7f0000002d80)=""/4096, 0x1000}], 0x8, &(0x7f0000000340)=""/106, 0x6a}}, {{0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000003e00)=""/4106, 0x100a}, {&(0x7f0000004e80)=""/172, 0xac}, {&(0x7f0000004f40)=""/148, 0x94}], 0x3}, 0x3f}, {{&(0x7f0000005140)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000005440)=[{&(0x7f00000051c0)=""/63, 0x3f}, {&(0x7f0000005200)=""/251, 0xfb}, {&(0x7f0000005300)=""/209, 0xd1}, {0x0}], 0x4, &(0x7f0000001b00)=""/167, 0xa7}, 0x4}], 0x6, 0x20000162, &(0x7f00000056c0)={0x77359400}) 12:23:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000500)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) 12:23:39 executing program 4: 12:23:39 executing program 1: 12:23:39 executing program 1: 12:23:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) fallocate(r1, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r1, &(0x7f0000002680)={'syz1', "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"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:39 executing program 4: 12:23:39 executing program 1: 12:23:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:23:39 executing program 0: 12:23:39 executing program 1: 12:23:39 executing program 4: 12:23:39 executing program 4: 12:23:39 executing program 1: 12:23:39 executing program 1: 12:23:39 executing program 4: [ 2574.531852] device bridge_slave_1 left promiscuous mode [ 2574.542947] bridge0: port 2(bridge_slave_1) entered disabled state [ 2574.611261] device bridge_slave_0 left promiscuous mode [ 2574.617254] bridge0: port 1(bridge_slave_0) entered disabled state 12:23:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) fallocate(r1, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r1, &(0x7f0000002680)={'syz1', "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"}, 0x138f) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x659d2369f0013242) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:40 executing program 1: 12:23:40 executing program 4: [ 2574.952452] device hsr_slave_1 left promiscuous mode [ 2575.014274] device hsr_slave_0 left promiscuous mode [ 2575.074770] team0 (unregistering): Port device team_slave_1 removed [ 2575.109833] team0 (unregistering): Port device team_slave_0 removed [ 2575.157440] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2575.211027] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2575.336667] bond0 (unregistering): Released all slaves [ 2576.390251] net_ratelimit: 20 callbacks suppressed [ 2576.390257] protocol 88fb is buggy, dev hsr_slave_0 [ 2576.400643] protocol 88fb is buggy, dev hsr_slave_1 [ 2576.790196] protocol 88fb is buggy, dev hsr_slave_0 [ 2576.795503] protocol 88fb is buggy, dev hsr_slave_1 [ 2577.011056] IPVS: ftp: loaded support on port[0] = 21 [ 2577.590225] protocol 88fb is buggy, dev hsr_slave_0 [ 2577.595341] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.049512] chnl_net:caif_netlink_parms(): no params data found [ 2578.089800] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.096562] bridge0: port 1(bridge_slave_0) entered disabled state [ 2578.103997] device bridge_slave_0 entered promiscuous mode [ 2578.111522] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.119113] bridge0: port 2(bridge_slave_1) entered disabled state [ 2578.126532] device bridge_slave_1 entered promiscuous mode [ 2578.145093] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2578.155867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2578.174135] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2578.181941] team0: Port device team_slave_0 added [ 2578.187795] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2578.195232] team0: Port device team_slave_1 added [ 2578.201350] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2578.209031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2578.264284] device hsr_slave_0 entered promiscuous mode [ 2578.300767] device hsr_slave_1 entered promiscuous mode [ 2578.320234] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.325361] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.341391] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2578.348821] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2578.365328] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.372320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2578.378938] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.385555] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2578.418945] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2578.425953] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2578.435755] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2578.446541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2578.454015] bridge0: port 1(bridge_slave_0) entered disabled state [ 2578.461697] bridge0: port 2(bridge_slave_1) entered disabled state [ 2578.470152] protocol 88fb is buggy, dev hsr_slave_0 [ 2578.472384] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2578.475256] protocol 88fb is buggy, dev hsr_slave_1 [ 2578.481510] 8021q: adding VLAN 0 to HW filter on device team0 [ 2578.496188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2578.504862] bridge0: port 1(bridge_slave_0) entered blocking state [ 2578.511920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2578.523561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2578.531870] bridge0: port 2(bridge_slave_1) entered blocking state [ 2578.538766] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2578.561850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2578.569590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2578.577412] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2578.586553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2578.594690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2578.603687] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2578.610703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2578.626874] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2578.634697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2578.642362] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2578.654028] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2579.040592] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2579.898588] audit: type=1804 audit(1574166225.500:1843): pid=8486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir876142790/syzkaller.ufSOOH/0/bus" dev="sda1" ino=16961 res=1 12:23:45 executing program 4: 12:23:45 executing program 1: 12:23:45 executing program 0: 12:23:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) write$binfmt_misc(r2, &(0x7f0000002680)={'syz1', "b50fd98fb8cb1f648891eac8a1a48991e90e328498373d6a5c1a84da110bc9c96b0850c23581c929c38acea9979fc69a9d52e067419bcc4b48345b6341bf8933d8ddeb74ba64b08366bb675660f7bc1c43762e6ff5392ff4babbadea6b6a925939d197dccc86348ecc2d482c55112e502752817874a8a5b8b8455fd6adf2805ce5eb39b2d112142340476e04d9211f51ca10dfc4ba6a7e43d9ce6d098921efe04e25ada4d15974b3872d5f49ee8301a9e72a6ac3c1cab2e166e97fc939427e3838d671fec8ff4e655b40dde38e028a36685edb954e6c1219d117f491c95fffc00825d73eac76e87222c8a70a562a37d3cd8cac2fdd783844351a1877a89d662421ed3c68655a0fa65bf790747f971dfe5211bf2b19a95c6fb9a9f9924c863da8cd8b5bd60fea618b98c0d91b0ab210c4a0c35947b9098e7c5a8e1bb3967f079cdc26d2fb297611e6c33414e25498832580a36ba832c9a1aa21b69a75a2b93a4cb2201b43ff4b5e138a01f6a89d22fc3f77dc41250d8bc83804e2a320c0d963bf58d697cc963311ef30c562c1c69cf0ac29fb0194e232eec6c7d8efc8969eed5b3d7ce61c0b4ebc96fd23f7f66c82871a4347126c16228e1712ee8df55337b441f31d61e1164701821f2a4d512c2611039e36d2964289ba5fc74a4f8bb6df13cb15334667e36e86fdaa5e709e8e352706cec60222875ce90fb8a023c78e359dbeffebb28113fdc4eb648b3686f229ec505023ed8426c429eddd41d31785c90b762442aeebfb2a580689c4560add1df9c1a291631a6840bc6b5881fcd89140503f5947d4fbce3aa805177f4399b61fcd4102f484d2118cf5de61dd9d7cf57252d6abb3ce39345a322473512e2a3c0b7e3b1a2b4a24ab5580d7af1aab81280fa24a10ac6d8bc92a26f4d9a0c08f2002ba87d08cfc5f187c58edc5c74ddc178e5207866222a174896115a12d6a83c6b512f6f5e0143ae2b1f7107d770726d1cf78837c81e72f25cf910d7a51efae43902dd831589d787fa88a7746db8a4f88e9900db9caab70a219c59c274769a72add8bd7cc7ec2689f14ecc0384546fc55c9f398dab8626d75a075db39bd54abf5ee7f8b42009499ac7dc186b5176d9c6f71f22592ce5c255a98c3f1ed2ca62e5763ad9978af781649d7c0a6729cdd2722d2afc320a1526b403f7f68e140f31ea0394ba769901aa1877a6a857e4fc478b4cf9676de6919a5bf4df55b387083f97386e6d16ec9b1204af4854ccdd0c1e8d3369dcbc257d417af072b8fc111a64441012badfcfe681d1b1e3bb55106d828d986ea788163d6ae10112b71a6a00987a344e03194df42d88b39612bb5af2f7d36362228d351a38492ee0ad45b269c41c092e42768a546e723bf32c1f23af31e3a692bd18579dabebd3d4eb068fc81614a5efd5642834452b864c1dbaecec3ea44f0ba5834d3a45c688a6ddce225d00c9a22b694933c1bd49bac780ea9d8932dbbabaf1cf7584c5af756cf393c741e853b3926adf638541015b5550d0b0a163dad3d4fa587a995243a11318b784540f1453d4a1fc809050882543df74a921b122e9e4c66cf11b4d6b6a1a01fe799cced406ae93ad29c0c8709c27ffc0a131cb4ad4ba3fa0f1023db9f05cdf7405c25723d586b728411bee93785914085f4d11c3f48f728895f4201d33aec7db8468aaa39667bc9d95f0152a38263021d596e42bcfd7604a5e60d6d1496b79c46e0fa54298bb7f9d8eefd24aca29154e40793280aebb9d8010965d608257ab9917f375237b6c119964dc6b7d54c8f5637cb1e22d5d4bf13f76fedc7196e77b7d08fe2fdcdf5e7cad6abdaca2d3802f059630cff3169b4c40fe42cc9172cd9503f02760bac63352762d2e39be2e1e6dcf307208f2755ffc2d43ea1fc3af2402dda8acc7fdcc22a10deccf091790305ca6631a8ae66e6b32559865db0fd71d3c9394a27b5beac5fd21be67e51452893c6b2b5f5f248d92ddb27fe433bdf6c6f1875b98b32fe850b4a6dabee4bfd72b59118e1ae91b37cd7d454c505dc8a70d038aa150f72a3b9b27ca6d923bab6a3d1625c2160306a865bd6024ae3fac62a693470e60b8e8db083c3d175a7f6414a34825f9db5110330b747bbe9944266adce3e510577a1772d5d99d7692680f444dbccbf69a710d8222f437d6dfbd7c801bd36f64153c167b50654f23a4779007a992c67000d1934ef1ebb1b792f6cb9370c5d17f6a4cd9215901d6a55cc4f894aedcc8b3221b074d835bba13d90a1d931924fd875686bed25ab414619915960fbcdeffc9d74116f961b5ee38329581be7e0e7ef373e42d01d7b4661745af95c757f7ca1cd77e3606ec8572a684076a71561d03bd03b312b6e8624137c0e58f0357a7b238bf739704e2b92f402cf285d2ffe2dd658d3f4cefd9ca0dd59cd8830c8681acbc6283d11ef20818d5bafda5c57c2b8fc290fa19b53c12d730fd2edbd452674478c9bb8da31ab92d4f55046fb0e42c2152a60316406283b587ad3ccc7f8ee53332221b7e96e55e7f9196bfabbe0c294124a14e07654ec08a27ec09f5a2c03db8f64840fbfdebaab3a00a85c0fb717df0d615436a5ebe9f6a9199ddc0e4a8bf165aa1eafb84cee9126cf2cd57404037f4bc285586736f2cc0867f466ed6987c91bf7983e3fad38a3b133e0aac7d7b39e7ede9a42065660f109bd4e56911dd8394afc376fab85e28a2b8d3e722536c6bf7e18d9244795952a290e0323578ef255d75c5f62862b305b62b578494b31635505f00ad3fc9a5e095fe493492c63fa645e7f0639da8222f5263a0acbf90491a265f37be6e971c23b680cacf502f01e746ef21b577adcd5bd300cc92fe92cb64ab2592d5e9b2ed3bf9a3ee67c193ec3414eb8b0a05a568d16c36f4143f7005e575e3d973099694294c5719bebfcc11cd4219d8d421eb5727b7e67d12bee53867987c9c36074c29bf311c042a18c20e1f6e9a7433a767dc37358675c33a5e03e5b0389dd89ddf7dd4b95dc16e6c5fa4c50201a50d0c3e9f2d25e7b96796f3a043fbd67ab9f7d0a6eb9fff346012adef8ade02561041b9e8bf8ce3125117c6a3929078e9e7bef2fefc9ca853ca24ce0f8ddc8bc130252f19fc84dfd7d503767baafdd54e9decbca40c74c87326c7774f30ed94519205ff27a01796a17f9428d883dae310d4aea9b9cc1d75756c88469813467417980336fddd7db54b1c8eda40200000000000000a92347c501ed42663b0f3be8d4a88227250c2fe86979701c0eec9e7eb6de77b32982e4c00ce12051cee68727a5b2fc5f917fa6b5911d795871f6307960463f47c51416d229fe9efe257336cdf038a8005d54ce436cd475817128f1f8e9b819fb8eb6dec70b988c1fb40a22fb7830bdff1994340432fedfdf66470c01dce4e30efdd348b2679f1ceefaa399e96b872ee28e7e78ddaef13b2a8655bc983d41127df2c29dba1a1cbb95071538521a90e0994e9e821674cdc81c0ccd52ccc0924e1476f82f83ef49599e5c209d46dbb2f9c2627e07f9bfd51dab549ed6b1f9b79f3e8dbc08d0cb0802ffdbdfcecc094695e6d30c6d5c39e0f412a7f3599d0838ff4b48021e71eadcf2fba7ccdae2fdb898b5a40caa72f65c4ff7de855a6c4b29ae7332f908ca4773d955b0581801781b3df6b9635d67e301085b5b99df8cb94818f0db77691777cc85860467f92097d4b531631c8ee001122b5548d7cd632c8c667bbff792b4bf851238c3bfe1a298440ea71151251f0a0299ea761247ba2c1199ff93de05d0ef2fbffcb387e59944fb9a568a7c3b1ade56f2a267826d5d4adf49cad5a03eba7e3a121d2070fc00d2b3bed5f04b2afaeebffcf9f10b9f15dcf787bee5e37b98fc3ac8156d2de7a29d837c41e7d574c6fd5e835ddd198848e559bd677b62724efae9b4165835c438b514552b365ced2ee247723c29e26e6d48f87685af9d92a9ff85c0ecef6fb06da05a2a9f1496ff9cc22143acaa8520c4c1c883d87df093dcdf6dd14306b8ca738caa1c2874ac6320c3a90162925f89254c62b6dab891bab32f686b8a8fc3db580decb8f6c7b7cc1ae064702e0959725ce1f1195e54aae28fcd4378666583bfa20cafb38b88efe0fc2d30a22024613d98800ff7372af61232012b5467d0fe39ed6d29712a7f399396ed688731f3e40145e083435f6aa14e64197d5417159e505d95f2e0a61ea4e4ab8ef4bb84461268e6b8ecaf4c8bcf1235927adfb0041307174699f6a1521ae7ad97dc192e5d792ec486809279153087db65194c7e017702f4cf143b4ce6f33f203f36143a6b15cd0179c79148edd316084a9ddd7a51623588fd2892c52432b30677c8a1cdba423c70ffee6fa098441aeee51bc0a0cd47cbfb77ba8ae55685ea53b2fd1826e2dd69c42b2be8a9e47d7c2e28c689dc41612b926ce2488ae625edf393237a137de960e3910c3801f8e629b7f6d25f18fae43b701579a7be6bff1dd8ec1d3b57ebc0ef0bcbba22e58490b92770078552793d63b6b3be06b19a875df6330a86b001b08af23586194da2e8510b6373ee8c98ec05991a95b4a67cf881507744d29defe3027ceafb6da09eb058a331a12d7e4327b4012ac794c09eb1ee1d382b6556c34cce3429e0998a7f57ead7dc57d8cdb6421372bf20d71cf6504a663157bcb4006ed44dd319de11ed24adbe5a525434aa6816a0b5389d829318cd05c84796ce86f077117f85e677a89fcab0413fde0efaa1e4daf47c2f56750c0a184d69799eb95590b15535220647c8d3e53d6613705ba6151fd880571f05d2ab5e769b02b2beafce738be368f82779ceed7854106a832d57013ebbac4d97f782ebd83a7e0a9d1aa8fc38995125afffdcfc46bd61410fb6347cb5e8e39791e8b07db0716917b10263b0186a98be42543a8d5e9e941673dc0997dfee7ce1046f03316fd400f7e50b49e68a34f409515e884e94f0ab3820af850e2b9d87f5907ead86d4d3c252e081bf351122febeb7b1e3f0488c923555fd393c5d9b0b18c413ee7f558768f989d2b1f3f5028041be44b563e3866fd15251cc693fb4bffcb5d1d03cb316d69a46134ecf8c64852851a64d607fa7f89be28d08beab76263991904d618d5a6e3b8828656b5b86f54486fde870319ae87a15bc4960c5908108f987e8131b51a17f8529a78fe76ac945f31cdaf6fb53155314f438cc9c1da88c2adb8046b51a21caacbf9d57efad5c4591b2e6680699da4c5269161fb7c37ea8aa99528ef95fe4431e797a5fa89e91c8140e17d943394dab79dc95d09361f57fe43047ceb1d8b21200d4c09aa418ef74c72d26fa03cfed9cdb217b5f6031f25f086e37746ccf4796f810ba50c94d830c8649a51d8d59253b8f443773f317d4994614a716facf3cf021b8b751a189a9a9fc3a3f952ca8b6235eb455cdb665ac555dad0d7501dee0951ac2fb147996212524d940c3858be5febbe7b0c2319e4401a5917c672ab86528257d9b9a258b32a3eb95d1631ac8ed4fe9e9e9091d79a4a16f2da746436570864be89bc95dc784ec5c5dc021a33d92219b448c06b8518395512cf58cc18594281c6c909a92d31f03d2519cca33d2803794a2e21a6b54d9c9c6707e7e8ff50dd03fe9349953dfffbe979ac06d8d7445ec0c5a485020b3fb5a1df8b31dc022c143353f57d5ff551f0000004a19ff3582da8bb7841db4f8b157a15ee46a7e32cd11574d2c8c7039ade415f537c7568ff771d73df3f550de8bd616ed80a206b58fe5b071ef77cf5d3e58ed1c05478e000000000000000000000000000000000000000000000000b55348d238a15640fde4f9593c0bcd5e366a56c14dac3e03aa21a14b352e03294c4ab12e77bc26e27a57191cf4cfb044d2fbf519c8648acf390dfccebafa4c50ec42e0fcd6e2c34e59929ae1968d556991c380bda844b1b375b668e08a9801019314ed3d5c8884f878f9d3da448ceff5ddaec5acb296f73951b320980fce2cf4cea4d577765a023bb17364dd161030d1c78b350fca75f9240c100a90dda2eab4d3c389"}, 0x138f) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:23:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:45 executing program 1: 12:23:45 executing program 4: 12:23:45 executing program 4: 12:23:45 executing program 1: 12:23:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:45 executing program 1: 12:23:45 executing program 4: 12:23:45 executing program 4: 12:23:46 executing program 0: 12:23:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) fallocate(r2, 0x100000003, 0x804000, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:46 executing program 1: 12:23:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:46 executing program 4: 12:23:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {0x0}], 0x4, 0x0) 12:23:46 executing program 0: 12:23:46 executing program 1: 12:23:46 executing program 4: 12:23:46 executing program 1: 12:23:46 executing program 4: [ 2580.940629] device bridge_slave_1 left promiscuous mode [ 2580.948148] bridge0: port 2(bridge_slave_1) entered disabled state 12:23:46 executing program 1: [ 2581.040548] device bridge_slave_0 left promiscuous mode 12:23:46 executing program 4: [ 2581.088534] bridge0: port 1(bridge_slave_0) entered disabled state [ 2581.383636] device hsr_slave_1 left promiscuous mode [ 2581.455119] device hsr_slave_0 left promiscuous mode [ 2581.514284] team0 (unregistering): Port device team_slave_1 removed [ 2581.539260] team0 (unregistering): Port device team_slave_0 removed [ 2581.570374] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2581.635448] bond0 (unregistering): Releasing backup interface bond_slave_0 12:23:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:47 executing program 1: [ 2581.750147] net_ratelimit: 20 callbacks suppressed [ 2581.750153] protocol 88fb is buggy, dev hsr_slave_0 [ 2581.760690] protocol 88fb is buggy, dev hsr_slave_1 [ 2581.835807] bond0 (unregistering): Released all slaves [ 2582.470136] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.475301] protocol 88fb is buggy, dev hsr_slave_1 [ 2582.630145] protocol 88fb is buggy, dev hsr_slave_0 [ 2582.635285] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.030147] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.035292] protocol 88fb is buggy, dev hsr_slave_1 [ 2583.681010] IPVS: ftp: loaded support on port[0] = 21 [ 2583.830183] protocol 88fb is buggy, dev hsr_slave_0 [ 2583.835317] protocol 88fb is buggy, dev hsr_slave_1 [ 2584.539272] chnl_net:caif_netlink_parms(): no params data found [ 2584.578119] bridge0: port 1(bridge_slave_0) entered blocking state [ 2584.585232] bridge0: port 1(bridge_slave_0) entered disabled state [ 2584.592713] device bridge_slave_0 entered promiscuous mode [ 2584.599800] bridge0: port 2(bridge_slave_1) entered blocking state [ 2584.606621] bridge0: port 2(bridge_slave_1) entered disabled state [ 2584.614441] device bridge_slave_1 entered promiscuous mode [ 2584.632353] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2584.641985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2584.661376] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2584.668773] team0: Port device team_slave_0 added [ 2584.674900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2584.682396] team0: Port device team_slave_1 added [ 2584.688118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2584.697115] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2584.754655] device hsr_slave_0 entered promiscuous mode [ 2584.800710] device hsr_slave_1 entered promiscuous mode [ 2584.841370] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2584.848900] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2584.866145] bridge0: port 2(bridge_slave_1) entered blocking state [ 2584.872721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2584.879366] bridge0: port 1(bridge_slave_0) entered blocking state [ 2584.886194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2584.920864] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2584.927166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2584.937411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2584.947997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2584.955950] bridge0: port 1(bridge_slave_0) entered disabled state [ 2584.963192] bridge0: port 2(bridge_slave_1) entered disabled state [ 2584.975186] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2584.981672] 8021q: adding VLAN 0 to HW filter on device team0 [ 2584.991459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2584.999180] bridge0: port 1(bridge_slave_0) entered blocking state [ 2585.005697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2585.017393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2585.025466] bridge0: port 2(bridge_slave_1) entered blocking state [ 2585.031862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2585.049457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2585.058180] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2585.067708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2585.082525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2585.096833] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2585.107812] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2585.114405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2585.124248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2585.138349] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2585.147307] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2585.154686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2585.166923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2585.530716] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2586.276501] audit: type=1804 audit(1574166231.880:1844): pid=8554 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir525138797/syzkaller.DEMGqH/0/bus" dev="sda1" ino=16746 res=1 12:23:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:23:51 executing program 4: 12:23:51 executing program 0: 12:23:51 executing program 1: 12:23:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:52 executing program 4: 12:23:52 executing program 0: 12:23:52 executing program 1: 12:23:52 executing program 4: 12:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:23:52 executing program 1: 12:23:52 executing program 1: 12:23:52 executing program 4: 12:23:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:52 executing program 4: 12:23:52 executing program 1: [ 2586.790222] net_ratelimit: 18 callbacks suppressed [ 2586.790228] protocol 88fb is buggy, dev hsr_slave_0 [ 2586.800389] protocol 88fb is buggy, dev hsr_slave_1 12:23:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:52 executing program 1: 12:23:52 executing program 0: 12:23:52 executing program 4: 12:23:52 executing program 1: 12:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2587.200568] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.206658] protocol 88fb is buggy, dev hsr_slave_1 12:23:52 executing program 4: 12:23:52 executing program 1: 12:23:52 executing program 4: 12:23:53 executing program 1: [ 2587.441328] device bridge_slave_1 left promiscuous mode 12:23:53 executing program 4: [ 2587.482838] bridge0: port 2(bridge_slave_1) entered disabled state [ 2587.590324] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.595575] protocol 88fb is buggy, dev hsr_slave_1 [ 2587.611268] device bridge_slave_0 left promiscuous mode [ 2587.625249] bridge0: port 1(bridge_slave_0) entered disabled state [ 2587.774594] device hsr_slave_1 left promiscuous mode [ 2587.824404] device hsr_slave_0 left promiscuous mode [ 2587.887439] team0 (unregistering): Port device team_slave_1 removed [ 2587.913494] team0 (unregistering): Port device team_slave_0 removed [ 2587.946468] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2587.990163] protocol 88fb is buggy, dev hsr_slave_0 [ 2587.995338] protocol 88fb is buggy, dev hsr_slave_1 [ 2588.005401] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2588.087875] bond0 (unregistering): Released all slaves [ 2588.710127] protocol 88fb is buggy, dev hsr_slave_0 [ 2588.715265] protocol 88fb is buggy, dev hsr_slave_1 [ 2589.921461] IPVS: ftp: loaded support on port[0] = 21 [ 2590.796370] chnl_net:caif_netlink_parms(): no params data found [ 2590.832019] bridge0: port 1(bridge_slave_0) entered blocking state [ 2590.838705] bridge0: port 1(bridge_slave_0) entered disabled state [ 2590.846076] device bridge_slave_0 entered promiscuous mode [ 2590.853787] bridge0: port 2(bridge_slave_1) entered blocking state [ 2590.860806] bridge0: port 2(bridge_slave_1) entered disabled state [ 2590.867932] device bridge_slave_1 entered promiscuous mode [ 2590.884785] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2590.894362] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2590.911503] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2590.918839] team0: Port device team_slave_0 added [ 2590.924794] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2590.932326] team0: Port device team_slave_1 added [ 2590.938884] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2590.947555] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2591.013982] device hsr_slave_0 entered promiscuous mode [ 2591.050522] device hsr_slave_1 entered promiscuous mode [ 2591.101327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2591.108575] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2591.123964] bridge0: port 2(bridge_slave_1) entered blocking state [ 2591.130792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2591.137392] bridge0: port 1(bridge_slave_0) entered blocking state [ 2591.143805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2591.174129] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2591.181343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2591.189673] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2591.199175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2591.211459] bridge0: port 1(bridge_slave_0) entered disabled state [ 2591.218168] bridge0: port 2(bridge_slave_1) entered disabled state [ 2591.227885] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2591.234980] 8021q: adding VLAN 0 to HW filter on device team0 [ 2591.243960] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2591.252595] bridge0: port 1(bridge_slave_0) entered blocking state [ 2591.259640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2591.269308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2591.277522] bridge0: port 2(bridge_slave_1) entered blocking state [ 2591.283958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2591.301068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2591.309033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2591.317884] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2591.327122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2591.339975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2591.350941] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2591.357067] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2591.364536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2591.378258] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2591.386257] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2591.395960] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2591.407594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2591.780667] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2591.830349] net_ratelimit: 18 callbacks suppressed [ 2591.830356] protocol 88fb is buggy, dev hsr_slave_0 [ 2591.841875] protocol 88fb is buggy, dev hsr_slave_1 [ 2592.150412] protocol 88fb is buggy, dev hsr_slave_0 [ 2592.155749] protocol 88fb is buggy, dev hsr_slave_1 [ 2592.628169] audit: type=1804 audit(1574166238.230:1845): pid=8617 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir055366632/syzkaller.iD7a9d/0/bus" dev="sda1" ino=17633 res=1 12:23:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:58 executing program 1: 12:23:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:23:58 executing program 4: 12:23:58 executing program 0: 12:23:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:58 executing program 1: 12:23:58 executing program 0: 12:23:58 executing program 4: 12:23:58 executing program 4: 12:23:58 executing program 1: 12:23:58 executing program 0: 12:23:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:58 executing program 4: [ 2592.880189] protocol 88fb is buggy, dev hsr_slave_0 [ 2592.885398] protocol 88fb is buggy, dev hsr_slave_1 [ 2593.030215] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.035436] protocol 88fb is buggy, dev hsr_slave_1 12:23:58 executing program 1: 12:23:58 executing program 4: 12:23:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2593.430175] protocol 88fb is buggy, dev hsr_slave_0 [ 2593.435724] protocol 88fb is buggy, dev hsr_slave_1 12:23:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:23:59 executing program 1: 12:23:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:23:59 executing program 4: 12:23:59 executing program 0: 12:23:59 executing program 1: 12:23:59 executing program 4: 12:23:59 executing program 1: [ 2593.731923] device bridge_slave_1 left promiscuous mode [ 2593.743783] bridge0: port 2(bridge_slave_1) entered disabled state 12:23:59 executing program 4: 12:23:59 executing program 1: 12:23:59 executing program 4: [ 2593.899474] device bridge_slave_0 left promiscuous mode [ 2593.909900] bridge0: port 1(bridge_slave_0) entered disabled state [ 2594.113161] device hsr_slave_1 left promiscuous mode [ 2594.164036] device hsr_slave_0 left promiscuous mode [ 2594.204387] team0 (unregistering): Port device team_slave_1 removed [ 2594.256438] team0 (unregistering): Port device team_slave_0 removed [ 2594.276994] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2594.324575] bond0 (unregistering): Releasing backup interface bond_slave_0 12:24:00 executing program 1: 12:24:00 executing program 4: [ 2594.541662] bond0 (unregistering): Released all slaves [ 2596.361854] IPVS: ftp: loaded support on port[0] = 21 [ 2597.040247] net_ratelimit: 12 callbacks suppressed [ 2597.040254] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.050432] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.190183] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.195367] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.255682] chnl_net:caif_netlink_parms(): no params data found [ 2597.291103] bridge0: port 1(bridge_slave_0) entered blocking state [ 2597.297681] bridge0: port 1(bridge_slave_0) entered disabled state [ 2597.305068] device bridge_slave_0 entered promiscuous mode [ 2597.312188] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.318642] bridge0: port 2(bridge_slave_1) entered disabled state [ 2597.325789] device bridge_slave_1 entered promiscuous mode [ 2597.343380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2597.352818] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2597.369277] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2597.376700] team0: Port device team_slave_0 added [ 2597.382513] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2597.389999] team0: Port device team_slave_1 added [ 2597.395827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2597.403818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2597.472417] device hsr_slave_0 entered promiscuous mode [ 2597.510519] device hsr_slave_1 entered promiscuous mode [ 2597.561182] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2597.568962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2597.585784] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.592294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2597.599570] bridge0: port 1(bridge_slave_0) entered blocking state [ 2597.606144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2597.613650] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.618878] protocol 88fb is buggy, dev hsr_slave_1 [ 2597.648634] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2597.655591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2597.665290] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2597.675513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2597.684064] bridge0: port 1(bridge_slave_0) entered disabled state [ 2597.691242] bridge0: port 2(bridge_slave_1) entered disabled state [ 2597.702447] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2597.709131] 8021q: adding VLAN 0 to HW filter on device team0 [ 2597.718286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2597.726331] bridge0: port 1(bridge_slave_0) entered blocking state [ 2597.732871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2597.750713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2597.758386] bridge0: port 2(bridge_slave_1) entered blocking state [ 2597.765611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2597.773719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2597.782156] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2597.794244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2597.803428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2597.817200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2597.827728] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2597.834398] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2597.843867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2597.857829] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2597.867984] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2597.876215] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2597.887881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2597.950176] protocol 88fb is buggy, dev hsr_slave_0 [ 2597.955356] protocol 88fb is buggy, dev hsr_slave_1 [ 2598.070215] protocol 88fb is buggy, dev hsr_slave_0 [ 2598.075606] protocol 88fb is buggy, dev hsr_slave_1 [ 2598.250845] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2599.062110] audit: type=1804 audit(1574166244.660:1846): pid=8683 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir417797671/syzkaller.p7pAeL/0/bus" dev="sda1" ino=17767 res=1 12:24:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:04 executing program 1: 12:24:04 executing program 4: 12:24:04 executing program 0: 12:24:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:24:04 executing program 1: 12:24:04 executing program 4: 12:24:04 executing program 1: 12:24:04 executing program 0: 12:24:04 executing program 4: 12:24:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:04 executing program 1: 12:24:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:05 executing program 1: 12:24:05 executing program 4: 12:24:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:24:05 executing program 0: 12:24:05 executing program 1: 12:24:05 executing program 4: 12:24:05 executing program 1: 12:24:05 executing program 4: [ 2600.150775] device bridge_slave_1 left promiscuous mode [ 2600.156449] bridge0: port 2(bridge_slave_1) entered disabled state 12:24:05 executing program 4: 12:24:05 executing program 1: [ 2600.282181] device bridge_slave_0 left promiscuous mode [ 2600.296878] bridge0: port 1(bridge_slave_0) entered disabled state [ 2600.542769] device hsr_slave_1 left promiscuous mode [ 2600.664282] device hsr_slave_0 left promiscuous mode [ 2600.713768] team0 (unregistering): Port device team_slave_1 removed [ 2600.741565] team0 (unregistering): Port device team_slave_0 removed [ 2600.768437] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2600.818067] bond0 (unregistering): Releasing backup interface bond_slave_0 12:24:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:06 executing program 4: 12:24:06 executing program 1: [ 2600.985367] bond0 (unregistering): Released all slaves [ 2602.560255] net_ratelimit: 22 callbacks suppressed [ 2602.560261] protocol 88fb is buggy, dev hsr_slave_0 [ 2602.570333] protocol 88fb is buggy, dev hsr_slave_1 [ 2602.771041] IPVS: ftp: loaded support on port[0] = 21 [ 2603.270257] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.275366] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.430217] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.435380] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.661631] chnl_net:caif_netlink_parms(): no params data found [ 2603.698950] bridge0: port 1(bridge_slave_0) entered blocking state [ 2603.705479] bridge0: port 1(bridge_slave_0) entered disabled state [ 2603.712942] device bridge_slave_0 entered promiscuous mode [ 2603.720305] bridge0: port 2(bridge_slave_1) entered blocking state [ 2603.726746] bridge0: port 2(bridge_slave_1) entered disabled state [ 2603.734256] device bridge_slave_1 entered promiscuous mode [ 2603.751084] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2603.760441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2603.781089] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2603.788278] team0: Port device team_slave_0 added [ 2603.794093] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2603.802184] team0: Port device team_slave_1 added [ 2603.807796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2603.816232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2603.830225] protocol 88fb is buggy, dev hsr_slave_0 [ 2603.835608] protocol 88fb is buggy, dev hsr_slave_1 [ 2603.892749] device hsr_slave_0 entered promiscuous mode [ 2603.940731] device hsr_slave_1 entered promiscuous mode [ 2603.981296] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2603.988634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2604.006742] bridge0: port 2(bridge_slave_1) entered blocking state [ 2604.013324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2604.019920] bridge0: port 1(bridge_slave_0) entered blocking state [ 2604.026312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2604.058287] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2604.064751] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2604.075464] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2604.087408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2604.094880] bridge0: port 1(bridge_slave_0) entered disabled state [ 2604.102010] bridge0: port 2(bridge_slave_1) entered disabled state [ 2604.112576] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2604.118787] 8021q: adding VLAN 0 to HW filter on device team0 [ 2604.129528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2604.137522] bridge0: port 1(bridge_slave_0) entered blocking state [ 2604.144445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2604.155213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2604.163786] bridge0: port 2(bridge_slave_1) entered blocking state [ 2604.170221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2604.193782] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2604.204907] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2604.216644] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2604.224356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2604.232864] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2604.240996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2604.250459] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2604.258447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2604.265574] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2604.278479] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2604.287159] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2604.294129] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2604.306475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2604.350157] protocol 88fb is buggy, dev hsr_slave_0 [ 2604.355581] protocol 88fb is buggy, dev hsr_slave_1 [ 2604.650595] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2605.656625] audit: type=1804 audit(1574166251.260:1847): pid=8750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir541625690/syzkaller.ivZYoH/0/bus" dev="sda1" ino=16897 res=1 12:24:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:11 executing program 4: 12:24:11 executing program 1: 12:24:11 executing program 0: 12:24:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:24:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:11 executing program 1: 12:24:11 executing program 4: 12:24:11 executing program 4: 12:24:11 executing program 0: 12:24:11 executing program 1: 12:24:11 executing program 4: 12:24:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000009000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 12:24:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffa3, 0x0, 0x0, 0xfffffffffffffc8a) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:24:11 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000000080)={{0x1}}) 12:24:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:24:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:24:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0}, 0x28) 12:24:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 12:24:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffa3, 0x0, 0x0, 0xfffffffffffffc8a) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:24:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffa3, 0x0, 0x0, 0xfffffffffffffc8a) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 12:24:12 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, 0x0) pipe(0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) getsockname$netlink(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x4, 0x7ffffffc}, 0x14) shutdown(r1, 0x2) 12:24:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffa3, 0x0, 0x0, 0xfffffffffffffc8a) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) sendto$inet(r0, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) [ 2606.814966] device bridge_slave_1 left promiscuous mode [ 2606.904381] bridge0: port 2(bridge_slave_1) entered disabled state 12:24:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x800000204000, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) [ 2607.031455] device bridge_slave_0 left promiscuous mode [ 2607.038233] bridge0: port 1(bridge_slave_0) entered disabled state [ 2607.283329] device hsr_slave_1 left promiscuous mode [ 2607.338366] device hsr_slave_0 left promiscuous mode [ 2607.393908] team0 (unregistering): Port device team_slave_1 removed [ 2607.419307] team0 (unregistering): Port device team_slave_0 removed 12:24:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2607.449145] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2607.516712] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2607.590130] net_ratelimit: 20 callbacks suppressed [ 2607.590134] protocol 88fb is buggy, dev hsr_slave_0 [ 2607.600231] protocol 88fb is buggy, dev hsr_slave_1 12:24:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2607.644018] bond0 (unregistering): Released all slaves 12:24:13 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001400)="9635ab0f9b5d7c65e7ec1b65bb849db5dc282458ce7fa2aec4b02fc5fcf887958e688e0e10c3935c07135a1e", 0x2c}, {&(0x7f0000000340)="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", 0x1e2}], 0x2) 12:24:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x3c, 0x0, [0x4b564d00, 0x3]}) 12:24:13 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x88402) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000100)=0x2) ioctl$int_in(r0, 0x800060c0045005, &(0x7f0000000140)=0x40000) 12:24:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_names\x00') lseek(r0, 0x40000000, 0x0) [ 2607.990136] protocol 88fb is buggy, dev hsr_slave_0 [ 2607.995792] protocol 88fb is buggy, dev hsr_slave_1 [ 2608.790166] protocol 88fb is buggy, dev hsr_slave_0 [ 2608.795290] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.510248] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.515975] protocol 88fb is buggy, dev hsr_slave_1 [ 2609.581042] IPVS: ftp: loaded support on port[0] = 21 [ 2609.670296] protocol 88fb is buggy, dev hsr_slave_0 [ 2609.675631] protocol 88fb is buggy, dev hsr_slave_1 [ 2610.433942] chnl_net:caif_netlink_parms(): no params data found [ 2610.471458] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.477886] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.485307] device bridge_slave_0 entered promiscuous mode [ 2610.492551] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.499053] bridge0: port 2(bridge_slave_1) entered disabled state [ 2610.506333] device bridge_slave_1 entered promiscuous mode [ 2610.523378] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2610.532765] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2610.553752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2610.561218] team0: Port device team_slave_0 added [ 2610.567699] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2610.575099] team0: Port device team_slave_1 added [ 2610.581023] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2610.588688] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2610.654040] device hsr_slave_0 entered promiscuous mode [ 2610.720684] device hsr_slave_1 entered promiscuous mode [ 2610.781117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2610.789217] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2610.806397] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.812843] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2610.819773] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.826329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2610.858536] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2610.866085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2610.876182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2610.886974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2610.894506] bridge0: port 1(bridge_slave_0) entered disabled state [ 2610.901739] bridge0: port 2(bridge_slave_1) entered disabled state [ 2610.912401] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2610.918492] 8021q: adding VLAN 0 to HW filter on device team0 [ 2610.929190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2610.937030] bridge0: port 1(bridge_slave_0) entered blocking state [ 2610.943735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2610.960707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2610.968383] bridge0: port 2(bridge_slave_1) entered blocking state [ 2610.974786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2610.991285] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2610.999388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2611.009166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2611.019058] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2611.028410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2611.039315] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2611.046257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2611.059752] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2611.068397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2611.075671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2611.091429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2611.420549] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2612.359082] audit: type=1804 audit(1574166257.960:1848): pid=8864 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir894416625/syzkaller.5iKl4k/0/bus" dev="sda1" ino=17410 res=1 12:24:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000380)="5abe06f358f3e6019f35935deabd2f89", 0x10) close(r1) 12:24:18 executing program 0: 12:24:18 executing program 4: 12:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:24:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:18 executing program 1: 12:24:18 executing program 4: 12:24:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r4) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/184) 12:24:18 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1/file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) creat(0x0, 0x0) 12:24:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:18 executing program 4: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0xe8) r4 = socket$inet6(0xa, 0x2, 0x0) dup2(r4, r3) 12:24:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:18 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="6653070000053c07bc3376003639405cb4aed12f0000000000ae", 0x1a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2612.950183] net_ratelimit: 18 callbacks suppressed [ 2612.950190] protocol 88fb is buggy, dev hsr_slave_0 [ 2612.960976] protocol 88fb is buggy, dev hsr_slave_1 [ 2613.008930] ptrace attach of "/root/syz-executor.4"[8898] was attempted by "/root/syz-executor.4"[8899] [ 2613.510145] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.515302] protocol 88fb is buggy, dev hsr_slave_1 [ 2613.527916] device bridge_slave_1 left promiscuous mode [ 2613.534012] bridge0: port 2(bridge_slave_1) entered disabled state [ 2613.592388] device bridge_slave_0 left promiscuous mode [ 2613.598093] bridge0: port 1(bridge_slave_0) entered disabled state [ 2613.670146] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.675284] protocol 88fb is buggy, dev hsr_slave_1 12:24:19 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000001500)='/dev/vcsa#\x00', 0x1, 0x141001) write$UHID_INPUT(r0, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) 12:24:19 executing program 4: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000002340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}, 0x20) 12:24:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) 12:24:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) [ 2613.830198] protocol 88fb is buggy, dev hsr_slave_0 [ 2613.835418] protocol 88fb is buggy, dev hsr_slave_1 12:24:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgrp(0x0) sendmsg$nl_generic(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)={0x1c, 0x19, 0xffffffffffffffff, 0x0, 0x0, {0xd}, [@typed={0x8, 0x3, @pid=r1}]}, 0x1c}}, 0x0) [ 2613.897623] device hsr_slave_1 left promiscuous mode 12:24:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xb6, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x399, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x2b, 0xee, 0xf9, 0x0, 0x3ffc000000000000, 0x48050, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb081, 0x4, @perf_config_ext={0x0, 0x1}, 0x40c, 0x6, 0x0, 0x7, 0x1ff, 0x8, 0x9}, r2, 0x7, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c80)={r2, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001c40)='memory.events\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0xff, 0x5, 0x78, 0x0, 0x100, 0x100000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x2000, 0xbd, 0x40, 0x1, 0x9, 0xff}, r2, 0x3, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='memory.events\x00') 12:24:19 executing program 4: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0x0) ptrace(0x11, r0) [ 2614.085208] device hsr_slave_0 left promiscuous mode [ 2614.157353] team0 (unregistering): Port device team_slave_1 removed [ 2614.170876] team0 (unregistering): Port device team_slave_0 removed [ 2614.183350] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2614.230153] protocol 88fb is buggy, dev hsr_slave_0 [ 2614.235440] protocol 88fb is buggy, dev hsr_slave_1 [ 2614.254608] bond0 (unregistering): Releasing backup interface bond_slave_0 12:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 12:24:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xb6, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x399, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x2b, 0xee, 0xf9, 0x0, 0x3ffc000000000000, 0x48050, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb081, 0x4, @perf_config_ext={0x0, 0x1}, 0x40c, 0x6, 0x0, 0x7, 0x1ff, 0x8, 0x9}, r2, 0x7, 0xffffffffffffffff, 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001c80)={r2, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001c40)='memory.events\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x4, 0xff, 0x5, 0x78, 0x0, 0x100, 0x100000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x2000, 0xbd, 0x40, 0x1, 0x9, 0xff}, r2, 0x3, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000000c0)='memory.events\x00') [ 2614.331630] bond0 (unregistering): Released all slaves [ 2616.080975] IPVS: ftp: loaded support on port[0] = 21 [ 2617.057152] chnl_net:caif_netlink_parms(): no params data found [ 2617.093995] bridge0: port 1(bridge_slave_0) entered blocking state [ 2617.100622] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.107695] device bridge_slave_0 entered promiscuous mode [ 2617.114740] bridge0: port 2(bridge_slave_1) entered blocking state [ 2617.121765] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.128843] device bridge_slave_1 entered promiscuous mode [ 2617.147627] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2617.156957] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2617.176969] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2617.184612] team0: Port device team_slave_0 added [ 2617.190883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2617.198060] team0: Port device team_slave_1 added [ 2617.203827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2617.211412] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2617.285607] device hsr_slave_0 entered promiscuous mode [ 2617.330474] device hsr_slave_1 entered promiscuous mode [ 2617.370951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2617.378297] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2617.392142] bridge0: port 2(bridge_slave_1) entered blocking state [ 2617.398594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2617.405271] bridge0: port 1(bridge_slave_0) entered blocking state [ 2617.411674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2617.445345] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2617.452278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2617.461111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2617.471563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2617.478828] bridge0: port 1(bridge_slave_0) entered disabled state [ 2617.485870] bridge0: port 2(bridge_slave_1) entered disabled state [ 2617.496325] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2617.502721] 8021q: adding VLAN 0 to HW filter on device team0 [ 2617.511574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2617.519266] bridge0: port 1(bridge_slave_0) entered blocking state [ 2617.525661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2617.541785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2617.549468] bridge0: port 2(bridge_slave_1) entered blocking state [ 2617.556411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2617.566409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2617.576624] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2617.586554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2617.598042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2617.609592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2617.623555] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2617.630386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2617.644010] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2617.653031] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2617.659813] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2617.672388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2617.960369] net_ratelimit: 16 callbacks suppressed [ 2617.960376] protocol 88fb is buggy, dev hsr_slave_0 [ 2617.970470] protocol 88fb is buggy, dev hsr_slave_1 [ 2617.990252] protocol 88fb is buggy, dev hsr_slave_0 [ 2617.995417] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.040850] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2618.080280] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.085409] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.390434] protocol 88fb is buggy, dev hsr_slave_0 [ 2618.395761] protocol 88fb is buggy, dev hsr_slave_1 [ 2618.933363] audit: type=1804 audit(1574166264.540:1849): pid=8953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir282418588/syzkaller.6vOPja/0/bus" dev="sda1" ino=17790 res=1 12:24:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:24 executing program 1: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') readlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 12:24:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 12:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:24:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="860f4c0e57c99ca0ad78349f5803fd3a1a6d5cb848ca6b3a3206a6bc000023b3483f5492d0616e6600df2b1e1a85f73de44b"], 0x1}}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8e) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 12:24:24 executing program 1: open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000240)='/se;{\'v/k{\x815\xd6*\xd7-') 12:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 12:24:24 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) epoll_create1(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') shmget$private(0x0, 0x8000, 0x800, &(0x7f0000ff5000/0x8000)=nil) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78ab0213e2690f1487dc45ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e2c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00000000000000000000000b44e83e3dda95980482"], 0x93) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="7261770000000000000000002ad36fac000000000200000000000000000000000000f0ff0300000000000000000000ea5550df861284c750ca5ae145cf57f19b2459f4942f29df0116d5297ce3ceb74c3279d2"], 0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) fgetxattr(r2, &(0x7f00000001c0)=@known='system.sockprotoname\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 2619.133357] tmpfs: No value for mount option '/se;{'v/k{5Ö*×-' [ 2619.142539] tmpfs: No value for mount option '/se;{'v/k{5Ö*×-' 12:24:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x609, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x2c}}, 0x0) 12:24:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2619.200162] protocol 88fb is buggy, dev hsr_slave_0 [ 2619.205290] protocol 88fb is buggy, dev hsr_slave_1 [ 2619.219963] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:24:25 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) epoll_create1(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') shmget$private(0x0, 0x8000, 0x800, &(0x7f0000ff5000/0x8000)=nil) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78ab0213e2690f1487dc45ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e2c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00000000000000000000000b44e83e3dda95980482"], 0x93) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="7261770000000000000000002ad36fac000000000200000000000000000000000000f0ff0300000000000000000000ea5550df861284c750ca5ae145cf57f19b2459f4942f29df0116d5297ce3ceb74c3279d2"], 0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) fgetxattr(r2, &(0x7f00000001c0)=@known='system.sockprotoname\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:24:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) sendfile(r2, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x609, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x2c}}, 0x0) 12:24:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 12:24:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 12:24:25 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) epoll_create1(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') shmget$private(0x0, 0x8000, 0x800, &(0x7f0000ff5000/0x8000)=nil) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78ab0213e2690f1487dc45ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e2c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00000000000000000000000b44e83e3dda95980482"], 0x93) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000340)=ANY=[@ANYBLOB="7261770000000000000000002ad36fac000000000200000000000000000000000000f0ff0300000000000000000000ea5550df861284c750ca5ae145cf57f19b2459f4942f29df0116d5297ce3ceb74c3279d2"], 0x1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) fgetxattr(r2, &(0x7f00000001c0)=@known='system.sockprotoname\x00', &(0x7f0000000640)=""/4096, 0x1000) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 12:24:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x75}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 2620.051294] device bridge_slave_1 left promiscuous mode [ 2620.056977] bridge0: port 2(bridge_slave_1) entered disabled state [ 2620.114283] device bridge_slave_0 left promiscuous mode [ 2620.124977] bridge0: port 1(bridge_slave_0) entered disabled state [ 2620.373653] device hsr_slave_1 left promiscuous mode [ 2620.435081] device hsr_slave_0 left promiscuous mode [ 2620.494559] team0 (unregistering): Port device team_slave_1 removed [ 2620.525052] team0 (unregistering): Port device team_slave_0 removed 12:24:26 executing program 1: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) 12:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) [ 2620.543217] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2620.599539] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2620.747587] bond0 (unregistering): Released all slaves 12:24:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000054c0)=[{{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000100)='[', 0x1}], 0x1}}], 0x1, 0x0) 12:24:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:27 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 2622.981256] IPVS: ftp: loaded support on port[0] = 21 [ 2623.350297] net_ratelimit: 16 callbacks suppressed [ 2623.350304] protocol 88fb is buggy, dev hsr_slave_0 [ 2623.361087] protocol 88fb is buggy, dev hsr_slave_1 [ 2623.902335] IPVS: ftp: loaded support on port[0] = 21 [ 2623.926430] chnl_net:caif_netlink_parms(): no params data found [ 2623.965831] bridge0: port 1(bridge_slave_0) entered blocking state [ 2623.972497] bridge0: port 1(bridge_slave_0) entered disabled state [ 2623.980203] device bridge_slave_0 entered promiscuous mode [ 2623.993485] bridge0: port 2(bridge_slave_1) entered blocking state [ 2623.999884] bridge0: port 2(bridge_slave_1) entered disabled state [ 2624.007542] device bridge_slave_1 entered promiscuous mode [ 2624.038228] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2624.049664] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2624.070168] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.075325] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.089189] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2624.096642] team0: Port device team_slave_0 added [ 2624.102828] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2624.110094] team0: Port device team_slave_1 added [ 2624.116118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2624.124795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2624.193287] device hsr_slave_0 entered promiscuous mode [ 2624.230299] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.235461] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.250648] device hsr_slave_1 entered promiscuous mode [ 2624.313750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2624.333474] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2624.394620] chnl_net:caif_netlink_parms(): no params data found [ 2624.424188] bridge0: port 2(bridge_slave_1) entered blocking state [ 2624.430625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2624.437229] bridge0: port 1(bridge_slave_0) entered blocking state [ 2624.443615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2624.479340] bridge0: port 1(bridge_slave_0) entered blocking state [ 2624.486509] bridge0: port 1(bridge_slave_0) entered disabled state [ 2624.494927] device bridge_slave_0 entered promiscuous mode [ 2624.502351] bridge0: port 2(bridge_slave_1) entered blocking state [ 2624.508967] bridge0: port 2(bridge_slave_1) entered disabled state [ 2624.517179] device bridge_slave_1 entered promiscuous mode [ 2624.538176] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2624.547498] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2624.571608] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2624.578778] team0: Port device team_slave_0 added [ 2624.591610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2624.598969] team0: Port device team_slave_1 added [ 2624.605656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2624.614125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2624.640369] protocol 88fb is buggy, dev hsr_slave_0 [ 2624.645721] protocol 88fb is buggy, dev hsr_slave_1 [ 2624.682773] device hsr_slave_0 entered promiscuous mode [ 2624.720566] device hsr_slave_1 entered promiscuous mode [ 2624.761612] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2624.774390] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2624.801557] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2624.807770] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2624.814666] bridge0: port 2(bridge_slave_1) entered blocking state [ 2624.821329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2624.827933] bridge0: port 1(bridge_slave_0) entered blocking state [ 2624.834336] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2624.853101] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2624.868682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2624.877750] bridge0: port 1(bridge_slave_0) entered disabled state [ 2624.885174] bridge0: port 2(bridge_slave_1) entered disabled state [ 2624.893849] bridge0: port 1(bridge_slave_0) entered disabled state [ 2624.902012] bridge0: port 2(bridge_slave_1) entered disabled state [ 2624.909645] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2624.927752] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2624.934421] 8021q: adding VLAN 0 to HW filter on device team0 [ 2624.944747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2624.954394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2624.962719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2624.970521] bridge0: port 1(bridge_slave_0) entered blocking state [ 2624.976865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2624.991008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2624.998988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2625.007249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2625.015248] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.021661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2625.036963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2625.046229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2625.059777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2625.068551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2625.077754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2625.089574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2625.098428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2625.104766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2625.113400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2625.122640] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2625.134025] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2625.141682] device bridge_slave_1 left promiscuous mode [ 2625.147767] bridge0: port 2(bridge_slave_1) entered disabled state [ 2625.200996] device bridge_slave_0 left promiscuous mode [ 2625.207103] bridge0: port 1(bridge_slave_0) entered disabled state [ 2625.323756] device hsr_slave_1 left promiscuous mode [ 2625.374738] device hsr_slave_0 left promiscuous mode [ 2625.430333] protocol 88fb is buggy, dev hsr_slave_0 [ 2625.435463] protocol 88fb is buggy, dev hsr_slave_1 [ 2625.446546] team0 (unregistering): Port device team_slave_1 removed [ 2625.458515] team0 (unregistering): Port device team_slave_0 removed [ 2625.468354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2625.505467] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2625.585371] bond0 (unregistering): Released all slaves [ 2625.649539] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2625.656004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2625.663918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2625.671914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2625.678846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2625.688226] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2625.695950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2625.704032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2625.714287] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2625.721254] 8021q: adding VLAN 0 to HW filter on device team0 [ 2625.729667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2625.739599] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2625.749984] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2625.756219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2625.765319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2625.773165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2625.787104] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2625.795602] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2625.802784] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2625.813168] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2625.819990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2625.827257] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2625.835660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2625.843810] bridge0: port 1(bridge_slave_0) entered blocking state [ 2625.850219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2625.921626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2625.930286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2625.939366] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2625.949819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2625.963442] bridge0: port 2(bridge_slave_1) entered blocking state [ 2625.969807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2625.985746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2626.006973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2626.024307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2626.040522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2626.054284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2626.064492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2626.075610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2626.087322] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2626.099759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2626.109864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2626.124768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2626.146279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2626.157961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2626.169050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2626.186711] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2626.203831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2626.215629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2626.228992] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2626.244585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2626.274032] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2626.296142] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2626.309686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2626.326137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2626.375563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2626.401608] audit: type=1804 audit(1574166272.000:1850): pid=9044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir096648267/syzkaller.wuNhIF/0/bus" dev="sda1" ino=17830 res=1 12:24:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 12:24:32 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141a42, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) 12:24:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:32 executing program 2: write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000014c0)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}}}, 0x78) setgroups(0x404a, &(0x7f0000000480)=[0x0, 0x0]) [ 2627.722157] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 12:24:33 executing program 4: syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/3\x00\xc9\xc9\xec\x80\xe3\xd7\x19)aF>\x11\x9ed\xa4IWj\xd4$,\x86\xf9\xa0r\x02A>\xb4p\xb0\xbe\xcf0\xb6\xaa\xc1\x00\x02\x9e\x9b\".O=\xf3\x86r\xffp\xcf\x93Z\xf5\xfe{\xd9L\x92\xc3\x1a\xafx\xd1s\xe4$\xf1\xd7\xc4V\x05\xb4\x8d\x86~\xed\xa1\x84W\x1d\t\x00\x00\x00\t\xb1]\x01\xf6\xfe\x0eP\xcex\xc6h\x16\x81\xb1\rO\f\xb0\xdd\x92b\x00\xacAp4\x93\xf02\xba\xe7\xed\xaeG\x1dL\xd8\x91/\xc5L\xc57\x94\xb4\xf6;\xb6\"b\xc0\xcf\xf6\xf6\x1a\xbe\f^gZ\va\x82\xf78\x8c\xa0=Q\x9cm\x0f\xf5\xdf\x9b\x1c7\r\xeb\x15\xc9\xd8/,\x0e\x11\xa6e2o\xe4^\x83\a\x9aLm)\xae\x10\xeb\xad\xed\x8d46\xa2]\xad\xf5\xf2L\xfae%\xc3[q\x11\xab\x1d\xa1\xda!M/\xa1\xd6\xc1\x84=\xef\xe6\x0f\xb9?\x93V\xb9\xe0V\xf1\x91\xdc\xc8,n\xfd\xcd\x93\xb6/\xd9K\x04\x99\nV\xb7\x02\xd5\x02\x84,\x817\xae\xb3\xf2!\x9a\xc41\x1a\x83\x82\xbf/\xd9O\x99\xec\xd3\x87M0\xf0\x19\x8b\xe8t\x82\xf6\b^\xf0\xb2SP\x18B\xb8\x98\x99\xec\x8e\xe1') writev(r0, 0x0, 0x0) 12:24:33 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180), 0x8) 12:24:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:33 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x2, 0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x80000001}, {&(0x7f0000000240)}, {0x0}, {&(0x7f0000000300)="e513dd88e3f0cebab523c7c546da71062b8515e5b3d0d5cc9e7b7210", 0x1c}], 0x0) r0 = gettid() tkill(r0, 0x40020000000c) syz_open_procfs(0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="0201550000000a000000ff07000000ffffffa6000800000000000000004000ffffff85000000e1000000887700720030b5829237c3000031e900008000da55aa", 0x40, 0x1c0}]) r1 = creat(&(0x7f0000000840)='./file0\x00', 0x17c) socket(0x0, 0xf789dbab1abd17fe, 0x1) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000880)={@remote, @dev, @local, 0x5, 0x0, 0x0, 0x800, 0x6, 0x260000}) 12:24:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x7e) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 12:24:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:33 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)={0xf97cff8c, 0x8, 'SE Linux', "1200000006c46f0006000000070000003c9f0300000000000000c2080000000000001e2302000000"}, 0x38) 12:24:33 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x4, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x2, 0x803, 0xff) r2 = semget$private(0x0, 0x0, 0x8) semop(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x3000}, {0x4, 0x7}], 0x2) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10) r3 = dup(r1) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 12:24:33 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x100000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 12:24:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r3, &(0x7f0000000340)={'syz1'}, 0x4) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x2}) 12:24:33 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 12:24:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 12:24:34 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) [ 2628.390202] net_ratelimit: 26 callbacks suppressed [ 2628.390207] protocol 88fb is buggy, dev hsr_slave_0 [ 2628.400348] protocol 88fb is buggy, dev hsr_slave_1 [ 2628.710129] protocol 88fb is buggy, dev hsr_slave_0 [ 2628.715292] protocol 88fb is buggy, dev hsr_slave_1 [ 2628.752468] device bridge_slave_1 left promiscuous mode [ 2628.758122] bridge0: port 2(bridge_slave_1) entered disabled state [ 2628.831572] device bridge_slave_0 left promiscuous mode [ 2628.837115] bridge0: port 1(bridge_slave_0) entered disabled state [ 2629.012328] device hsr_slave_1 left promiscuous mode [ 2629.054067] device hsr_slave_0 left promiscuous mode [ 2629.094036] team0 (unregistering): Port device team_slave_1 removed [ 2629.121971] team0 (unregistering): Port device team_slave_0 removed [ 2629.143751] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2629.194608] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2629.336795] bond0 (unregistering): Released all slaves [ 2629.590177] protocol 88fb is buggy, dev hsr_slave_0 [ 2629.595490] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.310195] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.315737] protocol 88fb is buggy, dev hsr_slave_1 [ 2630.470193] protocol 88fb is buggy, dev hsr_slave_0 [ 2630.475308] protocol 88fb is buggy, dev hsr_slave_1 [ 2631.211621] IPVS: ftp: loaded support on port[0] = 21 [ 2632.076722] IPVS: ftp: loaded support on port[0] = 21 [ 2632.158231] chnl_net:caif_netlink_parms(): no params data found [ 2632.212623] bridge0: port 1(bridge_slave_0) entered blocking state [ 2632.219109] bridge0: port 1(bridge_slave_0) entered disabled state [ 2632.226493] device bridge_slave_0 entered promiscuous mode [ 2632.251067] bridge0: port 2(bridge_slave_1) entered blocking state [ 2632.257567] bridge0: port 2(bridge_slave_1) entered disabled state [ 2632.268711] device bridge_slave_1 entered promiscuous mode [ 2632.352146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2632.364204] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2632.378414] chnl_net:caif_netlink_parms(): no params data found [ 2632.403589] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2632.411390] team0: Port device team_slave_0 added [ 2632.420704] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2632.428104] team0: Port device team_slave_1 added [ 2632.434066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2632.447740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2632.479546] bridge0: port 1(bridge_slave_0) entered blocking state [ 2632.486097] bridge0: port 1(bridge_slave_0) entered disabled state [ 2632.493573] device bridge_slave_0 entered promiscuous mode [ 2632.506408] bridge0: port 2(bridge_slave_1) entered blocking state [ 2632.513744] bridge0: port 2(bridge_slave_1) entered disabled state [ 2632.521165] device bridge_slave_1 entered promiscuous mode [ 2632.574324] device hsr_slave_0 entered promiscuous mode [ 2632.640624] device hsr_slave_1 entered promiscuous mode [ 2632.681207] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2632.698962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2632.718508] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2632.727949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2632.752247] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2632.759533] team0: Port device team_slave_0 added [ 2632.768761] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2632.777196] team0: Port device team_slave_1 added [ 2632.784663] bridge0: port 2(bridge_slave_1) entered blocking state [ 2632.791094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2632.797728] bridge0: port 1(bridge_slave_0) entered blocking state [ 2632.804262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2632.813484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2632.821852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2632.884829] device hsr_slave_0 entered promiscuous mode [ 2632.941419] device hsr_slave_1 entered promiscuous mode [ 2632.991225] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2632.999046] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2633.029368] bridge0: port 2(bridge_slave_1) entered blocking state [ 2633.035814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2633.042507] bridge0: port 1(bridge_slave_0) entered blocking state [ 2633.048877] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2633.089857] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2633.096668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2633.107551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2633.123610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2633.131165] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.138044] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.145652] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.152456] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.163975] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2633.170403] 8021q: adding VLAN 0 to HW filter on device team0 [ 2633.178302] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2633.186680] device bridge_slave_1 left promiscuous mode [ 2633.192846] bridge0: port 2(bridge_slave_1) entered disabled state [ 2633.231237] device bridge_slave_0 left promiscuous mode [ 2633.236825] bridge0: port 1(bridge_slave_0) entered disabled state [ 2633.362100] device hsr_slave_1 left promiscuous mode [ 2633.403347] device hsr_slave_0 left promiscuous mode [ 2633.443560] team0 (unregistering): Port device team_slave_1 removed [ 2633.454445] team0 (unregistering): Port device team_slave_0 removed [ 2633.466034] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2633.514924] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2633.575275] bond0 (unregistering): Released all slaves [ 2633.645540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2633.654181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2633.662890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2633.670613] bridge0: port 1(bridge_slave_0) entered blocking state [ 2633.676952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2633.686836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2633.697046] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2633.706253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2633.714159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2633.723427] bridge0: port 2(bridge_slave_1) entered blocking state [ 2633.729791] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2633.737068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2633.747370] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2633.750161] net_ratelimit: 10 callbacks suppressed [ 2633.750166] protocol 88fb is buggy, dev hsr_slave_0 [ 2633.763344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2633.763414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2633.770241] protocol 88fb is buggy, dev hsr_slave_1 [ 2633.785629] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2633.795551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2633.802948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2633.811783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2633.819416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2633.827553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2633.835588] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2633.843662] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2633.852463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2633.861627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2633.869674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2633.883978] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2633.893041] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2633.903673] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2633.909753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2633.919406] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 2633.927773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2633.935796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2633.943461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2633.951476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2633.960227] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2633.966442] 8021q: adding VLAN 0 to HW filter on device team0 [ 2633.976161] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 2633.985746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2633.994060] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2634.001872] bridge0: port 1(bridge_slave_0) entered blocking state [ 2634.008214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2634.020125] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.024789] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2634.025252] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.038785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 2634.049207] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2634.058599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2634.066558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2634.074648] bridge0: port 2(bridge_slave_1) entered blocking state [ 2634.081101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2634.088144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2634.095040] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2634.105101] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 2634.113276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2634.124685] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2634.137845] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 2634.145306] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.145355] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.210402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2634.221217] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 2634.228982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2634.238447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2634.250250] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.255329] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.279716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 2634.299123] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2634.309897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2634.324682] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2634.337039] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 2634.356212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2634.367920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2634.375131] protocol 88fb is buggy, dev hsr_slave_0 [ 2634.375190] protocol 88fb is buggy, dev hsr_slave_1 [ 2634.396110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 2634.405905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2634.415531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2634.428060] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2634.434572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2634.462338] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2634.476655] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 2634.483329] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2634.496105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2634.513960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2635.466492] audit: type=1804 audit(1574166281.070:1851): pid=9134 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir769212085/syzkaller.EqkAdH/0/bus" dev="sda1" ino=16691 res=1 12:24:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="486edb4564d3c94d7ac13f7ead8e6030219d078e33b542d2c6fede5298610cc619ba921ab79013d9e2820556adeb2981c1be46664e258fc3f14c3603bee48b010c7f7150792c13045c55370b053f577206588810539841eb56a7cff43e0aef1c5d2e3e2418585b5ae1b6996473142161c775cb765880f0cb562ee51c7878aef661add6ac1add002757368cba2b9b3612d760f45259a2ef79bf2e61163f8551ec73fba4986a9277565c104784903a9ae1fef9a65c237336c006b3b880c4569e831a99c6adf07a6997806374cd735c1486cde4223d4679c21db8bdbd9574f7f6d97a67b481a48f76b295c30794ee4f92a3abac99981eea565291"], 0xf9) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:41 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 12:24:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:41 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x7e) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) write$binfmt_elf64(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 12:24:41 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kexec_load(0x2, 0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x80000001}, {&(0x7f0000000240)}, {0x0}, {&(0x7f0000000300)="e513dd88e3f0cebab523c7c546da71062b8515e5b3d0d5cc9e7b7210", 0x1c}], 0x0) r0 = gettid() tkill(r0, 0x40020000000c) syz_open_procfs(0x0, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="0201550000000a000000ff07000000ffffffa6000800000000000000004000ffffff85000000e1000000887700720030b5829237c3000031e900008000da55aa", 0x40, 0x1c0}]) r1 = creat(&(0x7f0000000840)='./file0\x00', 0x17c) socket(0x0, 0xf789dbab1abd17fe, 0x1) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000880)={@remote, @dev, @local, 0x5, 0x0, 0x0, 0x800, 0x6, 0x260000}) [ 2635.790944] audit: type=1804 audit(1574166281.400:1852): pid=9150 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir433112208/syzkaller.CO7jEi/0/bus" dev="sda1" ino=16785 res=1 12:24:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000900)=""/4096, 0xfd42, 0x0, 0x0, 0x112) 12:24:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 12:24:41 executing program 2: r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 12:24:41 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000001e40)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x5, &(0x7f0000000380)=[{&(0x7f0000000400)=""/199, 0xfffffe80}, {&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000340)=""/42, 0x2a}], 0x2, 0x0, 0x181, 0x200f00}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0xf43185f1) 12:24:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2635.855910] audit: type=1804 audit(1574166281.460:1853): pid=9151 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir433112208/syzkaller.CO7jEi/0/bus" dev="sda1" ino=16785 res=1 12:24:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket(0x11, 0x800000003, 0x81) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0xfffffe24) fstat(r2, &(0x7f0000000200)) stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$fuse(0x0, 0x0, 0x0, 0x2201000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'system:!/bdev'}}, {@obj_type={'obj_type', 0x3d, '-trustedem1&@'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) ftruncate(r7, 0x2008002) sendfile(r0, r7, 0x0, 0x200fff) 12:24:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 12:24:41 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 12:24:41 executing program 1: 12:24:42 executing program 1: 12:24:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2636.420978] device bridge_slave_1 left promiscuous mode [ 2636.426526] bridge0: port 2(bridge_slave_1) entered disabled state 12:24:42 executing program 1: [ 2636.496300] device bridge_slave_0 left promiscuous mode [ 2636.510542] bridge0: port 1(bridge_slave_0) entered disabled state 12:24:42 executing program 1: 12:24:42 executing program 1: [ 2636.822710] device hsr_slave_1 left promiscuous mode [ 2636.868313] device hsr_slave_0 left promiscuous mode [ 2636.908895] team0 (unregistering): Port device team_slave_1 removed [ 2636.932235] team0 (unregistering): Port device team_slave_0 removed [ 2636.944104] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2636.974764] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2637.112297] bond0 (unregistering): Released all slaves 12:24:43 executing program 2: 12:24:43 executing program 1: [ 2638.790268] net_ratelimit: 26 callbacks suppressed [ 2638.790274] protocol 88fb is buggy, dev hsr_slave_0 [ 2638.800787] protocol 88fb is buggy, dev hsr_slave_1 [ 2638.820980] IPVS: ftp: loaded support on port[0] = 21 [ 2639.030206] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.035638] protocol 88fb is buggy, dev hsr_slave_1 [ 2639.677551] chnl_net:caif_netlink_parms(): no params data found [ 2639.713096] bridge0: port 1(bridge_slave_0) entered blocking state [ 2639.719594] bridge0: port 1(bridge_slave_0) entered disabled state [ 2639.727024] device bridge_slave_0 entered promiscuous mode [ 2639.733934] bridge0: port 2(bridge_slave_1) entered blocking state [ 2639.740411] bridge0: port 2(bridge_slave_1) entered disabled state [ 2639.747480] device bridge_slave_1 entered promiscuous mode [ 2639.766248] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2639.775949] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2639.793197] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2639.800614] team0: Port device team_slave_0 added [ 2639.806205] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2639.813536] team0: Port device team_slave_1 added [ 2639.819216] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2639.827281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2639.892564] device hsr_slave_0 entered promiscuous mode [ 2639.930446] device hsr_slave_1 entered promiscuous mode [ 2639.970906] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2639.978154] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2639.990179] protocol 88fb is buggy, dev hsr_slave_0 [ 2639.992989] bridge0: port 2(bridge_slave_1) entered blocking state [ 2639.995312] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.001631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2640.013341] bridge0: port 1(bridge_slave_0) entered blocking state [ 2640.019668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2640.051753] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2640.057981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2640.067227] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2640.076808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2640.084184] bridge0: port 1(bridge_slave_0) entered disabled state [ 2640.091284] bridge0: port 2(bridge_slave_1) entered disabled state [ 2640.101424] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2640.107510] 8021q: adding VLAN 0 to HW filter on device team0 [ 2640.117450] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2640.125155] bridge0: port 1(bridge_slave_0) entered blocking state [ 2640.131565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2640.142627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2640.152159] bridge0: port 2(bridge_slave_1) entered blocking state [ 2640.158608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2640.173548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2640.190951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2640.198044] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2640.207783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2640.217270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2640.227206] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2640.233854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2640.247012] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2640.255050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2640.261923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2640.275744] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2640.350320] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.355580] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.480328] protocol 88fb is buggy, dev hsr_slave_0 [ 2640.485497] protocol 88fb is buggy, dev hsr_slave_1 [ 2640.670544] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2641.489462] audit: type=1804 audit(1574166287.090:1854): pid=9205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir966389935/syzkaller.Nzylb8/0/bus" dev="sda1" ino=16763 res=1 12:24:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket(0x11, 0x800000003, 0x81) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0xfffffe24) fstat(r2, &(0x7f0000000200)) stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$fuse(0x0, 0x0, 0x0, 0x2201000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'system:!/bdev'}}, {@obj_type={'obj_type', 0x3d, '-trustedem1&@'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) ftruncate(r7, 0x2008002) sendfile(r0, r7, 0x0, 0x200fff) 12:24:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket(0x11, 0x800000003, 0x81) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0xfffffe24) fstat(r2, &(0x7f0000000200)) stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$fuse(0x0, 0x0, 0x0, 0x2201000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'system:!/bdev'}}, {@obj_type={'obj_type', 0x3d, '-trustedem1&@'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) ftruncate(r7, 0x2008002) sendfile(r0, r7, 0x0, 0x200fff) 12:24:47 executing program 1: 12:24:47 executing program 2: 12:24:47 executing program 1: 12:24:47 executing program 2: 12:24:47 executing program 1: 12:24:47 executing program 1: 12:24:47 executing program 1: 12:24:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2642.560565] device bridge_slave_1 left promiscuous mode [ 2642.566274] bridge0: port 2(bridge_slave_1) entered disabled state [ 2642.621114] device bridge_slave_0 left promiscuous mode [ 2642.626801] bridge0: port 1(bridge_slave_0) entered disabled state 12:24:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket(0x11, 0x800000003, 0x81) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0xfffffe24) fstat(r2, &(0x7f0000000200)) stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$fuse(0x0, 0x0, 0x0, 0x2201000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'system:!/bdev'}}, {@obj_type={'obj_type', 0x3d, '-trustedem1&@'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) ftruncate(r7, 0x2008002) sendfile(r0, r7, 0x0, 0x200fff) 12:24:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:48 executing program 4: 12:24:48 executing program 2: 12:24:48 executing program 1: 12:24:48 executing program 1: 12:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0xf, @ipv4=@multicast1=0x4000600}]}]}, 0x24}}, 0x0) 12:24:48 executing program 1: [ 2642.854758] device hsr_slave_1 left promiscuous mode 12:24:48 executing program 1: [ 2642.906600] device hsr_slave_0 left promiscuous mode 12:24:48 executing program 1: [ 2642.977083] team0 (unregistering): Port device team_slave_1 removed 12:24:48 executing program 1: [ 2643.031368] team0 (unregistering): Port device team_slave_0 removed [ 2643.090936] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2643.166884] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2643.298483] bond0 (unregistering): Released all slaves [ 2644.150185] net_ratelimit: 18 callbacks suppressed [ 2644.150192] protocol 88fb is buggy, dev hsr_slave_0 [ 2644.160914] protocol 88fb is buggy, dev hsr_slave_1 [ 2644.880306] protocol 88fb is buggy, dev hsr_slave_0 [ 2644.886107] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.030434] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.035895] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.270172] protocol 88fb is buggy, dev hsr_slave_0 [ 2645.276202] protocol 88fb is buggy, dev hsr_slave_1 [ 2645.551648] IPVS: ftp: loaded support on port[0] = 21 [ 2646.230564] protocol 88fb is buggy, dev hsr_slave_0 [ 2646.235775] protocol 88fb is buggy, dev hsr_slave_1 [ 2646.439670] chnl_net:caif_netlink_parms(): no params data found [ 2646.479747] bridge0: port 1(bridge_slave_0) entered blocking state [ 2646.486461] bridge0: port 1(bridge_slave_0) entered disabled state [ 2646.493827] device bridge_slave_0 entered promiscuous mode [ 2646.502174] bridge0: port 2(bridge_slave_1) entered blocking state [ 2646.508718] bridge0: port 2(bridge_slave_1) entered disabled state [ 2646.516230] device bridge_slave_1 entered promiscuous mode [ 2646.535758] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2646.545510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2646.566126] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2646.574227] team0: Port device team_slave_0 added [ 2646.581636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2646.589283] team0: Port device team_slave_1 added [ 2646.595451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2646.603156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2646.674059] device hsr_slave_0 entered promiscuous mode [ 2646.710644] device hsr_slave_1 entered promiscuous mode [ 2646.751220] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2646.759055] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2646.775664] bridge0: port 2(bridge_slave_1) entered blocking state [ 2646.782505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2646.789330] bridge0: port 1(bridge_slave_0) entered blocking state [ 2646.795922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2646.828136] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2646.835230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2646.844433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2646.855826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2646.864194] bridge0: port 1(bridge_slave_0) entered disabled state [ 2646.872941] bridge0: port 2(bridge_slave_1) entered disabled state [ 2646.883569] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2646.890015] 8021q: adding VLAN 0 to HW filter on device team0 [ 2646.899393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2646.907874] bridge0: port 1(bridge_slave_0) entered blocking state [ 2646.915225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2646.930509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2646.938775] bridge0: port 2(bridge_slave_1) entered blocking state [ 2646.946609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2646.957348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2646.968466] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2646.978489] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2646.990447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2647.001202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2647.012317] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2647.018673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2647.035617] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2647.045419] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2647.054676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2647.066348] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2647.430707] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:24:54 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) socket$inet6(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x2010, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x29, 0x0, 0x62) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:24:54 executing program 1: 12:24:54 executing program 4: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='\x1e\xff\xffJ\xdf\xdfn\xc4\xa2I\x00', 0x8d4800, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, &(0x7f0000000340)=""/90, 0xffffffffffffffb5) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='sessionid\x00') socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) bind$packet(r1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x0, 0x0}, 0x8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) read(0xffffffffffffffff, &(0x7f0000000ac0)=""/245, 0x100000394) sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x4000002, 0x0, 0x0) 12:24:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket(0x11, 0x800000003, 0x81) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0x2}, 0xfffffe24) fstat(r2, &(0x7f0000000200)) stat(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)) stat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ftruncate(r4, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r6) mount$fuse(0x0, 0x0, 0x0, 0x2201000, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x800}}], [{@uid_eq={'uid', 0x3d, r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'system:!/bdev'}}, {@obj_type={'obj_type', 0x3d, '-trustedem1&@'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}}) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000000c0)={0x2}, 0x8, 0x800) ftruncate(r7, 0x2008002) sendfile(r0, r7, 0x0, 0x200fff) 12:24:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:54 executing program 1: 12:24:54 executing program 1: 12:24:54 executing program 1: 12:24:54 executing program 4: 12:24:54 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0xb, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32], 0x1}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000000000,dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',dfltgi', @ANYRESHEX, @ANYBLOB=',access=any,version=9p2000.L', @ANYRESDEC, @ANYBLOB]) getresgid(&(0x7f0000000240), 0xfffffffffffffffe, 0x0) sendmsg$nl_route(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 12:24:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:24:54 executing program 2: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) 12:24:54 executing program 4: gettid() clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xfffffffe) add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) sync() 12:24:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2648.795349] futex_wake_op: syz-executor.4 tries to shift op by 4095; fix this program [ 2648.842649] futex_wake_op: syz-executor.4 tries to shift op by 4095; fix this program [ 2649.200193] net_ratelimit: 18 callbacks suppressed [ 2649.200199] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.211045] protocol 88fb is buggy, dev hsr_slave_1 12:24:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:24:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x10020, 0x0) 12:24:54 executing program 0: socket$packet(0x11, 0x0, 0x300) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getuid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x40000) creat(0x0, 0x1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x5000aea5, &(0x7f0000000280)={0x0, 0x5, [], [0xc1]}) 12:24:54 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$TIOCLINUX3(r1, 0x4b41, &(0x7f0000000080)) 12:24:54 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) ftruncate(r0, 0x3bb7) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x145002) sendfile(r3, r2, 0x0, 0x8000fffffffe) [ 2649.320316] audit: type=1804 audit(1574166294.920:1855): pid=9301 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 12:24:55 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0xa4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2649.397462] audit: type=1804 audit(1574166294.960:1856): pid=9305 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 [ 2649.430166] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.436124] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.490802] device bridge_slave_1 left promiscuous mode [ 2649.496628] bridge0: port 2(bridge_slave_1) entered disabled state [ 2649.520164] protocol 88fb is buggy, dev hsr_slave_0 [ 2649.525414] protocol 88fb is buggy, dev hsr_slave_1 [ 2649.585958] device bridge_slave_0 left promiscuous mode [ 2649.595429] bridge0: port 1(bridge_slave_0) entered disabled state [ 2649.676577] audit: type=1804 audit(1574166295.280:1857): pid=9314 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="bus" dev="sda1" ino=16860 res=1 [ 2649.739434] audit: type=1804 audit(1574166295.340:1858): pid=9316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="bus" dev="sda1" ino=16860 res=1 12:24:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=@newlink={0x54, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_ADDRESS={0xc, 0x1, @empty=[0x2]}]}, 0x54}}, 0x0) [ 2649.854870] audit: type=1804 audit(1574166295.380:1859): pid=9316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="bus" dev="sda1" ino=16860 res=1 [ 2649.892787] device hsr_slave_1 left promiscuous mode [ 2649.927794] audit: type=1804 audit(1574166295.390:1860): pid=9316 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="bus" dev="sda1" ino=16860 res=1 [ 2649.963968] device hsr_slave_0 left promiscuous mode 12:24:55 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x24815}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000040)='./file0\x00', 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x700084, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@posixacl='posixacl'}, {@rq={'rq', 0x3d, 0x4}}, {@common=@access_uid={'access', 0x3d, r6}}, {@timeout={'timeout', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0xfff}}, {@timeout={'timeout', 0x3d, 0x7}}], [{@dont_hash='dont_hash'}]}}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={0x1c, 0x4000000000002, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x8, @pid}]}, 0x1c}, 0x1, 0xf000}, 0x0) ioctl$sock_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000380)) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000240)={0x0, 0x3a1, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRESHEX], 0x1}}, 0x9d919cd54b7e43fe) socket$inet_tcp(0x2, 0x1, 0x0) [ 2650.028844] team0 (unregistering): Port device team_slave_1 removed [ 2650.049180] team0 (unregistering): Port device team_slave_0 removed [ 2650.062588] bond0 (unregistering): Releasing backup interface bond_slave_1 12:24:55 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x40000210) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0xb, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0xd000) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000000000,dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX, @ANYBLOB=',access=any,version=9p2000.L,fscache,fscache,uid<', @ANYRESDEC]) getresgid(&(0x7f0000000240), 0xfffffffffffffffe, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 12:24:55 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2650.115182] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2650.146323] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 2650.239647] bond0 (unregistering): Released all slaves 12:24:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4004ae86, &(0x7f0000000140)) [ 2650.390168] protocol 88fb is buggy, dev hsr_slave_0 [ 2650.395341] protocol 88fb is buggy, dev hsr_slave_1 [ 2651.110257] protocol 88fb is buggy, dev hsr_slave_0 [ 2651.115734] protocol 88fb is buggy, dev hsr_slave_1 [ 2652.231823] IPVS: ftp: loaded support on port[0] = 21 [ 2653.447945] chnl_net:caif_netlink_parms(): no params data found [ 2653.488565] bridge0: port 1(bridge_slave_0) entered blocking state [ 2653.495412] bridge0: port 1(bridge_slave_0) entered disabled state [ 2653.502903] device bridge_slave_0 entered promiscuous mode [ 2653.509877] bridge0: port 2(bridge_slave_1) entered blocking state [ 2653.516641] bridge0: port 2(bridge_slave_1) entered disabled state [ 2653.524083] device bridge_slave_1 entered promiscuous mode [ 2653.540974] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2653.550403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2653.569221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2653.576664] team0: Port device team_slave_0 added [ 2653.583467] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2653.590995] team0: Port device team_slave_1 added [ 2653.596754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2653.604580] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2653.672776] device hsr_slave_0 entered promiscuous mode [ 2653.710623] device hsr_slave_1 entered promiscuous mode [ 2653.751091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2653.758535] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2653.775508] bridge0: port 2(bridge_slave_1) entered blocking state [ 2653.781919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2653.788761] bridge0: port 1(bridge_slave_0) entered blocking state [ 2653.795185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2653.826474] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2653.833382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2653.843007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2653.852727] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2653.859867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2653.866897] bridge0: port 2(bridge_slave_1) entered disabled state [ 2653.877891] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2653.885273] 8021q: adding VLAN 0 to HW filter on device team0 [ 2653.894352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2653.902185] bridge0: port 1(bridge_slave_0) entered blocking state [ 2653.908653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2653.918204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2653.926585] bridge0: port 2(bridge_slave_1) entered blocking state [ 2653.933040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2653.951208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2653.959110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2653.967396] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2653.979771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2653.990401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2653.999521] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2654.005685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2654.019840] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2654.028581] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2654.035795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2654.046601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2654.230282] net_ratelimit: 14 callbacks suppressed [ 2654.230287] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.240943] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.350187] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.355404] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.440730] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2654.480833] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.485942] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.550468] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.555796] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.270238] protocol 88fb is buggy, dev hsr_slave_0 [ 2655.275460] protocol 88fb is buggy, dev hsr_slave_1 [ 2655.344165] audit: type=1804 audit(1574166300.950:1861): pid=9369 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir098003641/syzkaller.K7kXfv/0/bus" dev="sda1" ino=16793 res=1 12:25:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:01 executing program 0: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) 12:25:01 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) socket(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80046601, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x30, 0x80001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$unix(0x1, 0x5, 0x0) r4 = msgget$private(0x0, 0x0) msgsnd(r4, 0x0, 0x0, 0x0) msgsnd(r4, &(0x7f0000000800)={0x227ad19de656cacd, "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"}, 0xc08, 0x800) msgctl$IPC_RMID(r4, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @broadcast}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x4, {0x2, 0x4e22, @broadcast}, 'team0\x00'}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) syz_genetlink_get_family_id$tipc(0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r5, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) renameat2(r5, &(0x7f0000000000)='./file1\x00', r5, &(0x7f0000000100)='./file0\x00', 0x0) 12:25:01 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:01 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x24815}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x80800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00\x00\x00\x83\xad\x00\x00\x00zl\x00', 0x0}) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000040)='./file0\x00', 0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000440)={'lo\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x700084, &(0x7f0000000280)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@common=@posixacl='posixacl'}, {@rq={'rq', 0x3d, 0x4}}, {@common=@access_uid={'access', 0x3d, r6}}, {@timeout={'timeout', 0x3d, 0x10001}}, {@rq={'rq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0xfff}}, {@timeout={'timeout', 0x3d, 0x7}}], [{@dont_hash='dont_hash'}]}}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@loopback, 0x0, r3}) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r7, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000940)={0x1c, 0x4000000000002, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x8, @pid}]}, 0x1c}, 0x1, 0xf000}, 0x0) ioctl$sock_SIOCOUTQNSD(r7, 0x894b, &(0x7f0000000380)) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000240)={0x0, 0x3a1, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYRESHEX], 0x1}}, 0x9d919cd54b7e43fe) socket$inet_tcp(0x2, 0x1, 0x0) 12:25:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) clone(0x2102105ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(r0, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x2) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000980)=ANY=[@ANYBLOB="44d9195b2745c9", @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x9, &(0x7f00000000c0)=0x3, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r2, r3, 0x0, 0x80000003) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) getrlimit(0x0, 0x0) 12:25:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f0000000280)='9p\x00', 0x4000, &(0x7f0000000640)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_uid={'access'}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@access_any='access=any'}, {@fscache='fscache'}], [{@euid_lt={'euid<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62], 0x2d, [0x0, 0x119fd552c2434261]}}}]}}) r2 = geteuid() r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="0000fe00000000", @ANYRES32, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="040004000000000008001974", @ANYRES32, @ANYBLOB="1000010000000000200006"], 0x9, 0x1) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nl, &(0x7f00000004c0)=0x80, 0x800) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000500)='team_slave_1\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 12:25:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000780)=@ipx, 0x3d, 0x0, 0x0, 0x0, 0xfffa}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x7000000) 12:25:01 executing program 1: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x20000004e21, @local}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@link_local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @udp={0x2, 0x4e21, 0x8}}}}}, 0x0) 12:25:01 executing program 4: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') read(r0, &(0x7f0000000340)=""/90, 0xffffffffffffffb5) io_setup(0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:25:01 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='\x14dev.\x01vm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x73, 0x221) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffefffc, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) 12:25:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 12:25:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:01 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='\x14dev.\x01vm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x73, 0x221) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffefffc, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) [ 2656.046524] 9pnet: Insufficient options for proto=fd [ 2656.390850] device bridge_slave_1 left promiscuous mode [ 2656.396476] bridge0: port 2(bridge_slave_1) entered disabled state [ 2656.451046] device bridge_slave_0 left promiscuous mode [ 2656.466886] bridge0: port 1(bridge_slave_0) entered disabled state 12:25:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 12:25:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 12:25:02 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2656.632654] device hsr_slave_1 left promiscuous mode [ 2656.666373] 9pnet: Insufficient options for proto=fd [ 2656.685664] device hsr_slave_0 left promiscuous mode [ 2656.746234] team0 (unregistering): Port device team_slave_1 removed [ 2656.769406] team0 (unregistering): Port device team_slave_0 removed [ 2656.817997] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2656.884324] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2657.031588] bond0 (unregistering): Released all slaves 12:25:02 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffd4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) memfd_create(&(0x7f0000000040)=',@\x00', 0x0) 12:25:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 12:25:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) 12:25:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) [ 2657.219181] 9pnet: Insufficient options for proto=fd [ 2657.225604] 9pnet: Insufficient options for proto=fd 12:25:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924924924924f0, 0x0) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x141042, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000880)={0x3, 0x0, [{0x0, 0x10, &(0x7f0000000100)=""/16}, {0x0, 0xcf, &(0x7f00000006c0)=""/207}, {0x0, 0x5d, &(0x7f00000003c0)=""/93}]}) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x80, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf74cf491b23dbb8d) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) [ 2657.340340] 9pnet: Insufficient options for proto=fd 12:25:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000060000001d00000000000000950000000000000062a6ebc241b34b18530d0c3361a894da46ab8f3253f043fea4c96d5b7c7397bcb46d91"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 12:25:03 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2657.434674] [ 2657.436718] ********************************************************** [ 2657.451959] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2657.458905] ** ** [ 2657.468177] ** trace_printk() being used. Allocating extra memory. ** [ 2657.477890] ** ** [ 2657.488013] ** This means that this is a DEBUG kernel and it is ** [ 2657.497741] ** unsafe for production use. ** [ 2657.507632] ** ** [ 2657.517173] 9pnet: Insufficient options for proto=fd [ 2657.526215] ** If you see this message and you are not debugging ** [ 2657.536043] ** the kernel, report this immediately to your vendor! ** [ 2657.547212] ** ** [ 2657.556060] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 2657.566346] ********************************************************** [ 2658.106407] 9pnet: Insufficient options for proto=fd [ 2659.291164] IPVS: ftp: loaded support on port[0] = 21 [ 2659.440188] net_ratelimit: 14 callbacks suppressed [ 2659.440193] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.450479] protocol 88fb is buggy, dev hsr_slave_1 [ 2659.600205] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.605328] protocol 88fb is buggy, dev hsr_slave_1 [ 2659.830244] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.835525] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.219963] chnl_net:caif_netlink_parms(): no params data found [ 2660.259869] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.266522] bridge0: port 1(bridge_slave_0) entered disabled state [ 2660.275117] device bridge_slave_0 entered promiscuous mode [ 2660.282399] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.288923] bridge0: port 2(bridge_slave_1) entered disabled state [ 2660.296819] device bridge_slave_1 entered promiscuous mode [ 2660.316134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2660.325942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2660.345316] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2660.352935] team0: Port device team_slave_0 added [ 2660.358887] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2660.366318] team0: Port device team_slave_1 added [ 2660.372257] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2660.380451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2660.462727] device hsr_slave_0 entered promiscuous mode [ 2660.520633] device hsr_slave_1 entered promiscuous mode [ 2660.591360] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2660.598970] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2660.616728] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.623152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2660.629739] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.636280] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.668896] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2660.675917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2660.685169] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2660.696267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2660.703845] bridge0: port 1(bridge_slave_0) entered disabled state [ 2660.710807] bridge0: port 2(bridge_slave_1) entered disabled state [ 2660.721284] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2660.727561] 8021q: adding VLAN 0 to HW filter on device team0 [ 2660.738615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2660.746457] bridge0: port 1(bridge_slave_0) entered blocking state [ 2660.752871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2660.765906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2660.773735] bridge0: port 2(bridge_slave_1) entered blocking state [ 2660.780139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2660.790225] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.795360] protocol 88fb is buggy, dev hsr_slave_1 [ 2660.808424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2660.816451] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2660.826440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2660.839552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2660.851034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2660.861806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2660.867904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2660.882971] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2660.891318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2660.898102] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2660.909932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2660.980216] protocol 88fb is buggy, dev hsr_slave_0 [ 2660.985671] protocol 88fb is buggy, dev hsr_slave_1 [ 2661.210878] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2661.997391] audit: type=1804 audit(1574166307.600:1862): pid=9486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir745604292/syzkaller.akErTV/0/bus" dev="sda1" ino=16930 res=1 12:25:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:07 executing program 4: open(0x0, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924f77, 0x4ffe0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x3e) write$binfmt_script(r1, 0x0, 0x0) close(r0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 12:25:07 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd(0x0) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffd4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) memfd_create(&(0x7f0000000040)=',@\x00', 0x0) 12:25:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0xa4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x400000000000004, 0x0, 0x1, 0x6, 0x0, 0x0, 0xc5e]}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000004c0)=0x210, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x73, 0x221) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffefffc, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) socket$inet6(0xa, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 12:25:07 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:07 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, &(0x7f0000000740)=""/177, &(0x7f0000000800)=0xb1) open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) epoll_create1(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 12:25:07 executing program 1: r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001800110300000000000000000a00000600000000000000001400050000000000000000000000000000000001"], 0x30}}, 0x0) 12:25:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2662.219121] 9pnet: Insufficient options for proto=fd 12:25:07 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) fchdir(0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYPTR64], 0x8) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() mknodat(0xffffffffffffffff, 0x0, 0xd22a601e83144c4, 0x0) tkill(r1, 0x16) 12:25:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="030442166c00600000000000fff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x306c, 0x4000002, 0x0, 0x2ff) 12:25:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0xb, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES32], 0x1}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000000000,dfltuid=', @ANYRESHEX=0x0, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC, @ANYBLOB]) getresgid(&(0x7f0000000240), 0xfffffffffffffffe, 0x0) sendmsg$nl_route(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 12:25:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0xa4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:08 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9\x9d]\xce\xaa#\x87X\xb0\xbf9\n\x9f!A&$F\x86\xfd\x17\x95me\xd0\x19G\bP5\xa4\x05\x00\xb8\xee\xb3X(\x83\xc2\xee8\\\xa5\xb1\x1aed\x94\x9b\xfb\x1d\x1f\xf2\xccr\x0fV\x88\xdf-\xd5N\x1d+ \xa5\xa1Fm\x85\v\xa1\xf87GAV\"%y\xfas\xdd9\x9e\x96R\x16\x19\xa2Y\x92z\xabc\xec\"A\x90\xcf\x83\xf2\xbb\xdb\xe1\xfb\x90JF\xa8\x80\xa9\xe0\xc8\xf3j\x03\xb4\x911.\x86\xcb\xe8\x05\xdd\x1dRV\x9d \x8c\n7\xe6\xb7ys\xcd \xb5\x92\x913\xddV\xb5\xaa\xd8\"\aj(\xe4\xfc}\xcc*\x1a,_\xb7\xf6\xa4SQ\x1c\xb3\xbe\x1e\tK\x9co\x17pR\xb5\"\xb2Jl2\x0f\xd5\xa5v9\xcc\x8c\x98\xb1\xe3\x00\xc6\n#\x82Up#\x96\xd4L\xa6\x00z\xc7\xfaF_\xf5:5\x0f\xb4sQD\x9c\x14?\x04-\xa3\xea9\xd1\xfc\x03z\x86\x14\xa4M\x8fu\xf9\xcb\xe4\xca\xd1\xf6\xba\xbd\x8dM\xb9\xb6\xc8\x94\xf2\v;\xde\xd1\xf0!\f\xb2\x1b\xb3\xba\xcaI=R7\x9c_\xcc\x8eZ\xae\xc5\xc9\x9e\xbdPMpW\xeeNt\x05S&\xdf\t\x98\xe7\xe8#\xa7\xa0\x9f>\x18e\x1c!\x01\xa8\xae-\xc7\xc1\xda#P\x03\xe4\xee\x91\x84\xd9\xf9|4\xb94\xa2\xa2V\x14\xe7\x99\xf1\xafM\xbbT\xa8\x7f\xb8M\x00\xa3X\xae\x996sb\x80M=\xd4\x9af\x8d\x8c\x16b\xe4\xb2\xb5\b\xcd+p\x9c\x88k8:8OD\vo{(\xca\xa8\xb0\x89\x18\xfa\x9f\xf7\t-\xb5\x9a\x06\xccRl\x10\xe8rc\x9a\x9e\xc85u\x7f\xe5\x05\xab\xd29\x1cV\xec\x8e\xda\xe2\xa7') [ 2662.748440] 9pnet: Insufficient options for proto=fd [ 2662.787012] 9pnet: Insufficient options for proto=fd 12:25:08 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='\x14dev.\x01vm\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x804000, 0x0) open(&(0x7f0000000300)='./file0\x00', 0xd97df792d08763d6, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='sessionid\x00') socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000002180)=0xfc, 0x3c3) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x73, 0x221) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffefffc, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffe91) socket$inet6(0xa, 0x1, 0x0) 12:25:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000040)="0f20e06635000001000f22e0660f71d300dadec4c3c5cf600b010500002e660f388209677d00640f1a070f01df65670fc79b00580000", 0x36}], 0xe34, 0x0, 0x0, 0x1cd) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000240)=ANY=[@ANYBLOB="05000000000000007bf1551f07000000bd164466000000001f000000ce3c00009f0100000000020000000000000000002b5800000700000002fdffff7b07800058dff98d95a759eaff03000000000400000000000000000007"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:25:08 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 12:25:08 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:08 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000140)=0xb7, 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback, 0x2}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) read(r0, &(0x7f0000000000)=""/71, 0x47) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2b383, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x6, 0x2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000140}, 0xc, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="100029bd7000fbdbdf2501000000000000000b00188b0000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x2014}, 0x2040800) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init1(0x400) r6 = gettid() link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0xc7, 0x1c000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000340)=0x6105, 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000001b00)=""/199, 0xc7}, 0x1) setsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000001c40)={@loopback, @local}, 0xc) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0xa}, 0x4}, {0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1ff, [0x8, 0x9d, 0xffff21c8, 0x7, 0x4, 0x6, 0x0, 0x9]}, 0x5c) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000064c0), 0x0, 0xc002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x6) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') [ 2662.986406] device bridge_slave_1 left promiscuous mode [ 2662.994380] bridge0: port 2(bridge_slave_1) entered disabled state 12:25:08 executing program 4: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.telinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) [ 2663.061554] device bridge_slave_0 left promiscuous mode [ 2663.069607] bridge0: port 1(bridge_slave_0) entered disabled state [ 2663.237811] ptrace attach of "/root/syz-executor.1"[9555] was attempted by "/root/syz-executor.1"[9560] [ 2663.393265] device hsr_slave_1 left promiscuous mode [ 2663.426734] device hsr_slave_0 left promiscuous mode [ 2663.487044] team0 (unregistering): Port device team_slave_1 removed [ 2663.523847] team0 (unregistering): Port device team_slave_0 removed [ 2663.574838] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2663.634131] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2663.763345] bond0 (unregistering): Released all slaves [ 2663.929636] audit: type=1800 audit(1574166309.530:1863): pid=9574 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16924 res=0 [ 2664.950254] net_ratelimit: 20 callbacks suppressed [ 2664.950260] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.961519] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.471667] IPVS: ftp: loaded support on port[0] = 21 [ 2665.670257] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.675411] protocol 88fb is buggy, dev hsr_slave_1 [ 2665.830260] protocol 88fb is buggy, dev hsr_slave_0 [ 2665.835366] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.070363] protocol 88fb is buggy, dev hsr_slave_0 [ 2666.075453] protocol 88fb is buggy, dev hsr_slave_1 [ 2666.398895] chnl_net:caif_netlink_parms(): no params data found [ 2666.435243] bridge0: port 1(bridge_slave_0) entered blocking state [ 2666.442247] bridge0: port 1(bridge_slave_0) entered disabled state [ 2666.449373] device bridge_slave_0 entered promiscuous mode [ 2666.456908] bridge0: port 2(bridge_slave_1) entered blocking state [ 2666.463458] bridge0: port 2(bridge_slave_1) entered disabled state [ 2666.471597] device bridge_slave_1 entered promiscuous mode [ 2666.488396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2666.497779] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2666.517989] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2666.525704] team0: Port device team_slave_0 added [ 2666.531505] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2666.538768] team0: Port device team_slave_1 added [ 2666.544719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2666.552383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2666.622708] device hsr_slave_0 entered promiscuous mode [ 2666.680486] device hsr_slave_1 entered promiscuous mode [ 2666.732033] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2666.739493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2666.756159] bridge0: port 2(bridge_slave_1) entered blocking state [ 2666.762723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2666.769332] bridge0: port 1(bridge_slave_0) entered blocking state [ 2666.775759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2666.806252] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2666.812938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2666.823031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2666.834522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2666.841841] bridge0: port 1(bridge_slave_0) entered disabled state [ 2666.848637] bridge0: port 2(bridge_slave_1) entered disabled state [ 2666.859055] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2666.866149] 8021q: adding VLAN 0 to HW filter on device team0 [ 2666.876643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2666.884824] bridge0: port 1(bridge_slave_0) entered blocking state [ 2666.891243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2666.901875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2666.909514] bridge0: port 2(bridge_slave_1) entered blocking state [ 2666.916367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2666.939826] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2666.950088] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2666.961808] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2666.969027] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2666.977651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2666.985418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2666.993340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2667.001326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2667.008280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2667.021615] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2667.030672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2667.037687] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2667.044972] protocol 88fb is buggy, dev hsr_slave_0 [ 2667.045029] protocol 88fb is buggy, dev hsr_slave_1 [ 2667.059696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2667.380994] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2668.284958] audit: type=1804 audit(1574166313.890:1864): pid=9592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir622227283/syzkaller.Obzn6V/0/bus" dev="sda1" ino=16950 res=1 12:25:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:14 executing program 4: inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus/../file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000100)={0x1, 0x0, [{0x1, 0x0, 0x0, 0xffffffff}]}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000780)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {}, {}, 0x0, 0x0, 0x0, 0xf0ffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) truncate(0x0, 0x800) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 12:25:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000140)=0xb7, 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback, 0x2}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) read(r0, &(0x7f0000000000)=""/71, 0x47) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2b383, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x6, 0x2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000140}, 0xc, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="100029bd7000fbdbdf2501000000000000000b00188b0000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x2014}, 0x2040800) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init1(0x400) r6 = gettid() link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0xc7, 0x1c000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000340)=0x6105, 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000001b00)=""/199, 0xc7}, 0x1) setsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000001c40)={@loopback, @local}, 0xc) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0xa}, 0x4}, {0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1ff, [0x8, 0x9d, 0xffff21c8, 0x7, 0x4, 0x6, 0x0, 0x9]}, 0x5c) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000064c0), 0x0, 0xc002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x6) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') 12:25:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x40}) 12:25:14 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:14 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioperm(0x0, 0x4, 0x3) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 12:25:14 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000040), 0x8) [ 2668.445603] *** Guest State *** [ 2668.449101] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 2668.458709] CR4: actual=0x0000000000f0ffdf, shadow=0x0000000000f0ffff, gh_mask=ffffffffffffe871 [ 2668.484769] CR3 = 0x00000000fffbc000 [ 2668.489965] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 12:25:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2668.506488] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2668.519408] ptrace attach of "/root/syz-executor.1"[9607] was attempted by "/root/syz-executor.1"[9609] [ 2668.527799] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2668.559897] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.583719] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.609386] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.636982] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.649902] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:25:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2668.659964] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.674568] GDTR: limit=0x00000000, base=0x0000000000000000 [ 2668.685087] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.709564] IDTR: limit=0x00000000, base=0x0000000000000000 [ 2668.735787] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2668.741725] IPVS: ftp: loaded support on port[0] = 21 [ 2668.758453] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2668.775215] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2668.796644] Interruptibility = 00000000 ActivityState = 00000000 [ 2668.809949] *** Host State *** [ 2668.817911] RIP = 0xffffffff81179e30 RSP = 0xffff888081a3f998 [ 2668.832092] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2668.845431] FSBase=00007fbe39c30700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 2668.864271] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 2668.877705] CR0=0000000080050033 CR3=000000009f8ee000 CR4=00000000001426f0 [ 2668.894235] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 2668.912350] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 2668.925464] *** Control State *** [ 2668.933820] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 2668.949814] EntryControls=0000d1ff ExitControls=002fefff [ 2668.963772] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2668.978799] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2668.994156] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2669.008981] reason=80000021 qualification=0000000000000000 [ 2669.022494] IDTVectoring: info=00000000 errcode=00000000 [ 2669.035002] TSC Offset = 0xfffffa6849aee878 [ 2669.049304] EPT pointer = 0x0000000093b5401e [ 2669.058360] Virtual processor ID = 0x0001 12:25:14 executing program 4: inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./bus/../file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000100)={0x1, 0x0, [{0x1, 0x0, 0x0, 0xffffffff}]}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f0000000780)={{}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {}, {}, 0x0, 0x0, 0x0, 0xf0ffff}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) truncate(0x0, 0x800) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 12:25:14 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2669.200759] *** Guest State *** [ 2669.204369] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 2669.237817] CR4: actual=0x0000000000f0ffdf, shadow=0x0000000000f0ffff, gh_mask=ffffffffffffe871 [ 2669.269075] CR3 = 0x00000000fffbc000 [ 2669.280919] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 2669.301427] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 2669.314187] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 2669.328088] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.346402] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.362342] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.379487] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.388391] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.396629] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.406054] GDTR: limit=0x00000000, base=0x0000000000000000 [ 2669.414264] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.422840] IDTR: limit=0x00000000, base=0x0000000000000000 [ 2669.441635] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 2669.468845] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 2669.490756] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 2669.516778] Interruptibility = 00000000 ActivityState = 00000000 [ 2669.537178] *** Host State *** [ 2669.548145] RIP = 0xffffffff81179e30 RSP = 0xffff888022eb7998 [ 2669.569305] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 2669.590145] FSBase=00007fbe39c30700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 2669.625263] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 2669.649437] CR0=0000000080050033 CR3=0000000088510000 CR4=00000000001426f0 [ 2669.673169] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 2669.728562] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 12:25:15 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000140)=0xb7, 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback, 0x2}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) read(r0, &(0x7f0000000000)=""/71, 0x47) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2b383, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x6, 0x2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000140}, 0xc, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="100029bd7000fbdbdf2501000000000000000b00188b0000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x2014}, 0x2040800) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init1(0x400) r6 = gettid() link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0xc7, 0x1c000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000340)=0x6105, 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000001b00)=""/199, 0xc7}, 0x1) setsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000001c40)={@loopback, @local}, 0xc) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0xa}, 0x4}, {0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1ff, [0x8, 0x9d, 0xffff21c8, 0x7, 0x4, 0x6, 0x0, 0x9]}, 0x5c) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000064c0), 0x0, 0xc002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x6) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') [ 2669.771528] *** Control State *** [ 2669.787689] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 2669.814722] EntryControls=0000d1ff ExitControls=002fefff [ 2669.833550] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 2669.850799] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2669.858871] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 2669.866094] reason=80000021 qualification=0000000000000000 [ 2669.873914] IDTVectoring: info=00000000 errcode=00000000 [ 2669.885060] TSC Offset = 0xfffffa67e2dae37b [ 2669.895221] EPT pointer = 0x000000004219701e [ 2669.905354] Virtual processor ID = 0x0001 12:25:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200000, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) futimesat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={{}, {0x77359400}}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x11, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp, 0x2000, 0x0, 0xfffffffe, 0x7, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x10000000, 0x1, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 2669.990190] net_ratelimit: 20 callbacks suppressed [ 2669.990197] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.000527] protocol 88fb is buggy, dev hsr_slave_1 12:25:15 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r3, 0x0, 0x1600bd7e, 0x0, 0x0) 12:25:15 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 12:25:15 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000140)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast1}, @gre}}}}, 0x0) 12:25:15 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) socket$nl_route(0x10, 0x3, 0x0) [ 2670.230122] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.235339] protocol 88fb is buggy, dev hsr_slave_1 [ 2670.287557] x_tables: eb_tables: snat target: used from hooks PREROUTING, but only usable from POSTROUTING [ 2670.660882] device bridge_slave_1 left promiscuous mode [ 2670.666495] bridge0: port 2(bridge_slave_1) entered disabled state [ 2670.721350] device bridge_slave_0 left promiscuous mode [ 2670.728508] bridge0: port 1(bridge_slave_0) entered disabled state [ 2670.864745] device hsr_slave_1 left promiscuous mode [ 2670.923533] device hsr_slave_0 left promiscuous mode [ 2670.964381] team0 (unregistering): Port device team_slave_1 removed [ 2670.976156] team0 (unregistering): Port device team_slave_0 removed [ 2670.986528] bond0 (unregistering): Releasing backup interface bond_slave_1 12:25:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$NBD_SET_SOCK(r0, 0xab00, r2) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab08, 0xffffffffffffffff) 12:25:16 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141a42, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) [ 2671.055354] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2671.133440] bond0 (unregistering): Released all slaves [ 2671.190148] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.195606] protocol 88fb is buggy, dev hsr_slave_1 [ 2671.910207] protocol 88fb is buggy, dev hsr_slave_0 [ 2671.915316] protocol 88fb is buggy, dev hsr_slave_1 [ 2672.080263] protocol 88fb is buggy, dev hsr_slave_0 [ 2672.085383] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.001563] IPVS: ftp: loaded support on port[0] = 21 [ 2673.893814] chnl_net:caif_netlink_parms(): no params data found [ 2673.939606] bridge0: port 1(bridge_slave_0) entered blocking state [ 2673.946551] bridge0: port 1(bridge_slave_0) entered disabled state [ 2673.954095] device bridge_slave_0 entered promiscuous mode [ 2673.961387] bridge0: port 2(bridge_slave_1) entered blocking state [ 2673.968993] bridge0: port 2(bridge_slave_1) entered disabled state [ 2673.976195] device bridge_slave_1 entered promiscuous mode [ 2673.994046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2674.004234] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2674.025802] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2674.033419] team0: Port device team_slave_0 added [ 2674.039034] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2674.046352] team0: Port device team_slave_1 added [ 2674.053695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2674.061484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2674.112522] device hsr_slave_0 entered promiscuous mode [ 2674.150455] device hsr_slave_1 entered promiscuous mode [ 2674.192551] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2674.200711] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2674.214749] bridge0: port 2(bridge_slave_1) entered blocking state [ 2674.221145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2674.227893] bridge0: port 1(bridge_slave_0) entered blocking state [ 2674.234477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2674.267186] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2674.274301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2674.285943] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2674.294832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2674.302410] bridge0: port 1(bridge_slave_0) entered disabled state [ 2674.309084] bridge0: port 2(bridge_slave_1) entered disabled state [ 2674.319037] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2674.325627] 8021q: adding VLAN 0 to HW filter on device team0 [ 2674.336471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2674.344836] bridge0: port 1(bridge_slave_0) entered blocking state [ 2674.351244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2674.362059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2674.369639] bridge0: port 2(bridge_slave_1) entered blocking state [ 2674.376048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2674.390568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2674.398807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2674.411445] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2674.426015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2674.436711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2674.447344] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2674.453966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2674.469481] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2674.481132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2674.487901] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2674.497983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2674.880490] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2675.350498] net_ratelimit: 18 callbacks suppressed [ 2675.350505] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.360726] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.614491] audit: type=1804 audit(1574166321.220:1865): pid=9688 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir907113110/syzkaller.nu9EQr/0/bus" dev="sda1" ino=16971 res=1 12:25:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) ftruncate(r1, 0x800) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @loopback}}, 0x20) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x19) wait4(0x0, 0x0, 0x0, 0x0) 12:25:21 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_nanosleep(0x5, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000140)=0xb7, 0x4) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback, 0x2}}, 0x0, 0x2, 0x0, "8b63e98a6e9a990ceacccaa0722f7b17adbfb251c09e5993d319d88199f6923e646c1d3eaad49bc3c0a86bd1683c51ec36b5d2dab5a220e04e0b20637e2b5a8dd3403bbe1ccf681d083e2307d3f5597b"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) read(r0, &(0x7f0000000000)=""/71, 0x47) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2b383, 0x0) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x6, 0x2) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000140}, 0xc, &(0x7f0000000580)={&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="100029bd7000fbdbdf2501000000000000000b00188b0000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x2014}, 0x2040800) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) inotify_init1(0x400) r6 = gettid() link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0xc7, 0x1c000000) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000340)=0x6105, 0x4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000001b00)=""/199, 0xc7}, 0x1) setsockopt$inet_mreqn(r7, 0x0, 0x20, &(0x7f0000001c40)={@loopback, @local}, 0xc) clone(0x4200a400, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0xa}, 0x4}, {0xa, 0x4e20, 0x0, @loopback, 0x7}, 0x1ff, [0x8, 0x9d, 0xffff21c8, 0x7, 0x4, 0x6, 0x0, 0x9]}, 0x5c) ptrace$setopts(0x4206, r6, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000064c0), 0x0, 0xc002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.opaque\x00', &(0x7f0000000400)='y\x00', 0x2, 0x6) syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') 12:25:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r1, r2) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:25:21 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 12:25:21 executing program 0: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 12:25:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 12:25:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:21 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x100000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 12:25:21 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) write$binfmt_elf32(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030003"], 0x13) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) 12:25:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2676.070174] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.075511] protocol 88fb is buggy, dev hsr_slave_1 12:25:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 2676.230144] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.235332] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.470186] protocol 88fb is buggy, dev hsr_slave_0 [ 2676.475311] protocol 88fb is buggy, dev hsr_slave_1 [ 2676.660581] device bridge_slave_1 left promiscuous mode [ 2676.666119] bridge0: port 2(bridge_slave_1) entered disabled state [ 2676.721527] device bridge_slave_0 left promiscuous mode [ 2676.727054] bridge0: port 1(bridge_slave_0) entered disabled state [ 2676.873046] device hsr_slave_1 left promiscuous mode [ 2676.920160] device hsr_slave_0 left promiscuous mode [ 2676.954602] team0 (unregistering): Port device team_slave_1 removed [ 2676.965508] team0 (unregistering): Port device team_slave_0 removed [ 2676.977121] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2677.014275] bond0 (unregistering): Releasing backup interface bond_slave_0 12:25:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000071, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007bd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 12:25:22 executing program 0: msgsnd(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0xd6d0c418f59fe7d0, 0x0) 12:25:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001400)="9635ab0f9b5d7c65e7ec1b65bb849db5dc282458ce7fa2aec4b02fc5fcf887958e688e0e10c3935c07135a1e2d9e2d17f1c625aa20d61856b9ebad9123ad786da317e51dad2df806219180709ea57c4c2e29b600fece937e6ab81fdb5f8110", 0x5f}, {&(0x7f0000000340)='>', 0x1}], 0x2) 12:25:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) [ 2677.075167] bond0 (unregistering): Released all slaves 12:25:22 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffff00, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x2d7) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ac"], 0x1) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fc000000) 12:25:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000040)) 12:25:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) 12:25:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 12:25:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) [ 2677.430126] protocol 88fb is buggy, dev hsr_slave_0 [ 2677.435434] protocol 88fb is buggy, dev hsr_slave_1 [ 2679.090990] IPVS: ftp: loaded support on port[0] = 21 [ 2680.009367] chnl_net:caif_netlink_parms(): no params data found [ 2680.047650] bridge0: port 1(bridge_slave_0) entered blocking state [ 2680.054378] bridge0: port 1(bridge_slave_0) entered disabled state [ 2680.062936] device bridge_slave_0 entered promiscuous mode [ 2680.071316] bridge0: port 2(bridge_slave_1) entered blocking state [ 2680.077754] bridge0: port 2(bridge_slave_1) entered disabled state [ 2680.085850] device bridge_slave_1 entered promiscuous mode [ 2680.104897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2680.114803] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2680.133545] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2680.140950] team0: Port device team_slave_0 added [ 2680.146707] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2680.154314] team0: Port device team_slave_1 added [ 2680.159957] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2680.167931] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2680.224121] device hsr_slave_0 entered promiscuous mode [ 2680.260911] device hsr_slave_1 entered promiscuous mode [ 2680.302987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2680.311151] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2680.328312] bridge0: port 2(bridge_slave_1) entered blocking state [ 2680.334797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2680.341544] bridge0: port 1(bridge_slave_0) entered blocking state [ 2680.348005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2680.381089] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2680.387330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2680.393599] net_ratelimit: 10 callbacks suppressed [ 2680.393604] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.393665] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.415852] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2680.425099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2680.432755] bridge0: port 1(bridge_slave_0) entered disabled state [ 2680.439766] bridge0: port 2(bridge_slave_1) entered disabled state [ 2680.449808] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2680.458835] 8021q: adding VLAN 0 to HW filter on device team0 [ 2680.468880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2680.476664] bridge0: port 1(bridge_slave_0) entered blocking state [ 2680.483210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2680.502271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2680.510790] bridge0: port 2(bridge_slave_1) entered blocking state [ 2680.517184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2680.525135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2680.538567] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2680.548472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2680.559752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2680.571231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2680.580724] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2680.586913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2680.604202] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2680.612534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2680.619341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2680.630160] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.631467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2680.635395] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.700230] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.705503] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.820234] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.825354] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.940201] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.945376] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.990600] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2681.887937] audit: type=1804 audit(1574166327.490:1866): pid=9788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir530548989/syzkaller.x1ssPt/0/bus" dev="sda1" ino=16609 res=1 12:25:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) 12:25:27 executing program 2: lsetxattr$security_selinux(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaac47, &(0x7f0000000080)=[{&(0x7f0000000000)="0201420000000a000000ff0700000000000063000800000000000000004000ffffff85000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) 12:25:27 executing program 4: creat(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x20000004}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r2, 0x4c03, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x1000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 12:25:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x7, 0x4) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, 0x0, &(0x7f0000000080)=0x3ba) 12:25:27 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) 12:25:27 executing program 4: clone(0x4002d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) getpgrp(0x0) memfd_create(0x0, 0x0) 12:25:27 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000540)='fou\x00') ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000000c0)={"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"}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) write$P9_RVERSION(r4, 0x0, 0x0) r5 = dup(r4) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f0000000180)={0x14c}, 0x3ed) ioctl$GIO_UNIMAP(r5, 0x4b66, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r6, &(0x7f0000000540)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302c4cc74d02f987c2cec6504df6ead74e17a60ab563e98b4b2a3d27a7082dbb78abd55fba3dc82f01bfb4a67cf621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dcb1c796fa1d83fbba2620927ff8eaff4f605000000000000001d4679079d20e7a5a4289b54cdef6382ab59789f118698ed2a7dc7d65dcf0135ea26c8a8e64dc72b7755fbe615722bf306dfb73615566469999d465c19dc8291640276d5f66608b1f05590aad9dfbcec7a0a080000000000000029bdc56bac2e56379b3f6c314901977cb66fc6dd0752042cf8cb2d376efada00531af47933caff525a8e0906f0d0dd850267a984b56ff15e52b7903695f8ffda315251f139ec554a36f5aefdc3632258ac18cc1690a0dd7c414c13224ea022c25c3b90580df35320d5495ab912452d118a7ca38efbe65a1c22ff9e4ce279c41b8a397b7cd2662bbf701c36c244df8bab83e5b744b46a325228a3bee8f4b3cc3a87ea8e22c51840d247c27f938b6c0859f835a71b8b8e71a44e190beb10afa9bc8d573081cc9d1edb750511fae2c5bf071340fa5cff439205ff181bbed1c167f7310056710cb6bf12c79f792529b135adefe1fa000f7d017e752422357642ab9a9a6b44f5c06306f910e2fa576fb9afa5d8daa319a648d7b89253e806ac488084da9069071e0cba0715a121bb9876431153ced2957955726331bdb30bccf3804ab4765fc37aa9000000"], 0x21c) r7 = dup(r6) write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f0000000180)={0x14c}, 0x3ed) sendto$packet(r7, &(0x7f0000000780)="ef3eab993a47d1908d8d1e8d8e3cd360e1eac6ed84b3e570d596945f89028d20aa60b047e76370affcca2fb97fc095b4f6e07be47f15deea94c707636e10b0179cbc868c311715141b876eebdace3df460edb3185a8798645657f38407e8f88b749c9ff979b0ea281a0053f708dbc180d57138298ed36f2420d2ac4a9c3ca59361d2b477f505f54648ee37ed8eef17c56beeae1b5cde38ba957c178b66dbb9de7085f388acab8d668e41d8c58499553591dfea811d0b020780de1669d645a6270430d01384e69f8613194a", 0xcb, 0x8000, 0x0, 0x0) getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000080)) ioctl$KVM_SET_MP_STATE(r3, 0x4004ae99, &(0x7f0000000000)=0x100005) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:25:27 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x60001) writev(r0, &(0x7f0000000040)=[{&(0x7f0000001400)="9635ab0f9b5d7c65e7ec1b65bb849db5dc282458ce7fa2aec4b02fc5fcf887958e688e0e10c3935c07135a1e2d9e2d17f1c625aa20d61856b9ebad9123ad786da317e51dad2df806219180", 0x4b}, {&(0x7f0000000340)="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", 0x255}], 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) 12:25:27 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') exit(0x0) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001380)=""/33, 0x21}], 0x1, 0x0) preadv(r0, &(0x7f00000013c0), 0x1e3, 0x0) 12:25:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-384-generic,chacha20-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="04000649", 0x4) socket(0x0, 0x0, 0x0) [ 2682.064977] ptrace attach of "/root/syz-executor.4"[9808] was attempted by "/root/syz-executor.4"[9809] 12:25:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:27 executing program 1: 12:25:28 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x6db6e559) getsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x2, &(0x7f0000000200)=""/184, &(0x7f00000002c0)=0xb8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x0, @broadcast}}, 0x1ff, 0x8, 0x7, 0x0, 0x100}, &(0x7f0000000140)=0x98) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r1, 0x0, 0x0) 12:25:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_MCAST_TO_UCAST={0x8, 0x1c, 0x1}]}}}]}, 0x44}}, 0x0) 12:25:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:28 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000040605"], 0x7}}, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 12:25:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r1, r2) 12:25:28 executing program 2: 12:25:28 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:28 executing program 1: [ 2682.893350] device bridge_slave_1 left promiscuous mode [ 2682.898988] bridge0: port 2(bridge_slave_1) entered disabled state [ 2682.905424] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 12:25:28 executing program 1: [ 2682.965281] device bridge_slave_0 left promiscuous mode [ 2682.971136] bridge0: port 1(bridge_slave_0) entered disabled state 12:25:28 executing program 1: 12:25:28 executing program 1: 12:25:28 executing program 1: 12:25:28 executing program 1: [ 2683.243200] device hsr_slave_1 left promiscuous mode [ 2683.284559] device hsr_slave_0 left promiscuous mode [ 2683.359571] team0 (unregistering): Port device team_slave_1 removed [ 2683.404627] team0 (unregistering): Port device team_slave_0 removed [ 2683.435122] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2683.498691] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2683.659911] bond0 (unregistering): Released all slaves 12:25:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:29 executing program 4: [ 2685.750244] net_ratelimit: 19 callbacks suppressed [ 2685.750250] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.760338] protocol 88fb is buggy, dev hsr_slave_1 [ 2685.781579] IPVS: ftp: loaded support on port[0] = 21 [ 2686.470224] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.475590] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.630226] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.635352] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.649634] chnl_net:caif_netlink_parms(): no params data found [ 2686.690518] bridge0: port 1(bridge_slave_0) entered blocking state [ 2686.698020] bridge0: port 1(bridge_slave_0) entered disabled state [ 2686.705198] device bridge_slave_0 entered promiscuous mode [ 2686.712792] bridge0: port 2(bridge_slave_1) entered blocking state [ 2686.719210] bridge0: port 2(bridge_slave_1) entered disabled state [ 2686.726665] device bridge_slave_1 entered promiscuous mode [ 2686.745995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2686.755457] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2686.773040] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2686.780375] team0: Port device team_slave_0 added [ 2686.785925] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2686.793398] team0: Port device team_slave_1 added [ 2686.798822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2686.806428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2686.864043] device hsr_slave_0 entered promiscuous mode [ 2686.870203] protocol 88fb is buggy, dev hsr_slave_0 [ 2686.875343] protocol 88fb is buggy, dev hsr_slave_1 [ 2686.910626] device hsr_slave_1 entered promiscuous mode [ 2686.970924] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2686.978179] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2686.994936] bridge0: port 2(bridge_slave_1) entered blocking state [ 2687.001365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2687.007945] bridge0: port 1(bridge_slave_0) entered blocking state [ 2687.014342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2687.045541] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2687.052274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2687.061249] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2687.069967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2687.078210] bridge0: port 1(bridge_slave_0) entered disabled state [ 2687.085059] bridge0: port 2(bridge_slave_1) entered disabled state [ 2687.096193] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2687.103496] 8021q: adding VLAN 0 to HW filter on device team0 [ 2687.113696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2687.121716] bridge0: port 1(bridge_slave_0) entered blocking state [ 2687.128156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2687.137922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2687.145927] bridge0: port 2(bridge_slave_1) entered blocking state [ 2687.152358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2687.171301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2687.178993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2687.187332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2687.195870] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2687.205460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2687.217833] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2687.224154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2687.237721] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2687.245666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2687.252843] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2687.265468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2687.340174] protocol 88fb is buggy, dev hsr_slave_0 [ 2687.345296] protocol 88fb is buggy, dev hsr_slave_1 [ 2687.630691] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2688.496786] audit: type=1804 audit(1574166334.100:1867): pid=9891 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir369252408/syzkaller.u0I9Se/0/bus" dev="sda1" ino=16771 res=1 12:25:34 executing program 2: 12:25:34 executing program 1: 12:25:34 executing program 4: 12:25:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:34 executing program 1: 12:25:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = dup2(r2, r5) ioctl$KVM_SET_VCPU_EVENTS(r6, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 12:25:34 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000100)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)=ANY=[@ANYBLOB="28030000", @ANYRES16=r6, @ANYBLOB="020029bd7000fbdbdf250100000008000100", @ANYBLOB="1002020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400000100000800", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c656400000000000000000000000000080003000600000004000400080006", @ANYRESHEX=0x0, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040080000408030000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f", @ANYRES32, @ANYBLOB="08000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004000c000908040000000100ff40010000005600070081ffffff020004537f000000000409040500000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75700000000000", @ANYRES32, @ANYBLOB="08f7490000005b3221605f00000000", @ANYRES32=0x0, @ANYBLOB="f400020040000100240001006c625f706f72745f7374617473000000000000000000000000080004000100010008000600"/60, @ANYRES32, @ANYBLOB="3c0001007c656e61626c6564000000000000000000000000001800030006000000040004000800064e00"/56, @ANYRES32], 0x15}, 0x1, 0x0, 0x0, 0xc0}, 0x8000004) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0x7530}, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000400)={'hsr0\x00', 0x0}) r11 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_timeval(r11, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0x7530}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002e00070200"/19, @ANYRES32=r13, @ANYBLOB="ecff1200071c0e00000000de"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f00000004c0)={'vxcan0\x00', r13}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="10010000f5e246b147675a33ab983a3a1d214dbdf72c8dcbc51feb8526c161b476888f53a38ba694b4eba71ac77bf5db7b2aed372b7671ace9654ae90657360b9c64454b6e8a734f37808a1ec7b908ebda84445b52b828e4ecff0110e7303464848694b5c3689b51082d3e92b0ce4fd37b9b9d2a6a25d6a1c2ffa96035edd6f8503cbb4300", @ANYRES16=r6, @ANYBLOB="20002abd7000ffdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f40002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f366000008000600", @ANYRES32=r14], 0x110}, 0x1, 0x0, 0x0, 0x24000042}, 0x10) syz_open_procfs(0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, 0xffffffffffffffff, 0x42369000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'s\x05\x00\x00\x80\x04\x00'}) socket$packet(0x11, 0x3, 0x300) 12:25:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:34 executing program 4: fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x100, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001102000000000000000000000800040003000000", 0x24) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)={0x0, 0x0, [0x0, 0x0, 0x40000084], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}) 12:25:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:35 executing program 2: socket$inet(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40058000}, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dfv/vga_arbiter\x00', 0x2000, 0x0) epoll_create1(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000000000080000000000002679da192941759d6260a7cefc97d25b42bb6dce788e7c2a1478741d465bee657c9f6a034eb34131cdb91afc0387cfa730508d3e9d18cf4e91b285c48cefc613c1e0102933c2aceac705f25fbc1235ccb3e87106e97c611f9c744466f3b92026102f8bd0b24171426cfbd556b9afcbf3d121e4ae6c830b783e59af0adaba282c17261f2ad127af81c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002c00070500"/20, @ANYRES32=r4, @ANYBLOB="7bda00000040feff3f3353000c0001e7ff0400000000000000000200"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000408}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=@bridge_getneigh={0x1b4, 0x1e, 0x0, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40001}, [@IFLA_NET_NS_FD={0x8}, @IFLA_CARRIER={0x8, 0x21, 0xf8}, @IFLA_VF_PORTS={0x160, 0x18, [{0x54, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xf8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "34ff5a02e3656419f875a97b4c477f46"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a2c6b1281914a6eab609261e52881819"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1f}]}, {0x90, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0f93dd48b82f4db2ccb3d7cdd3aef0d4"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "78ccf0e7f9e8a60afb9f3169fed7ac7c"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'vboxnet0\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "82505282d4684a5413cc8144518d88e8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "609f80024eba2949e2446bb2b81f7769"}, @IFLA_PORT_VF={0x8, 0x1, 0xffffff7f}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b658ea0bbfc374a45fee53dee809a28e"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x4}]}, {0x3c, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "867e7b0a1f20e61552504e848d0af7d8"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x8, 0x2, '@\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2841c74e0c89600c9648ac9b6d302024"}]}, {0x3c, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "598966812869e33a3749fc186b0d5b18"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c05e1c75f4ec5a7f4377ac84fda81eea"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x40}]}]}, @IFLA_AF_SPEC={0x10, 0x1a, [{0x4, 0xa}, {0x4, 0xfae1b8555c332eba}, {0x4, 0xa}]}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xc, 0x1, @random="2b7fa8f94beb"}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40000}, 0x20040810) r5 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000506050368fe07602b00003f0e430a001400020045b300070300000319001a00120002000e00010006000300"/57, 0x39}], 0x1) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'xrlan0\x00\x00\x00\x00\x00\x10\x00', 0x2}, 0x18) 12:25:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x2, 0xff}) 12:25:35 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:35 executing program 1: socket$inet(0x10, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000100)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)=ANY=[@ANYBLOB="28030000", @ANYRES16=r6, @ANYBLOB="020029bd7000fbdbdf250100000008000100", @ANYBLOB="1002020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400000100000800", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c656400000000000000000000000000080003000600000004000400080006", @ANYRESHEX=0x0, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040080000408030000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f", @ANYRES32, @ANYBLOB="08000700000000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c0004000c000908040000000100ff40010000005600070081ffffff020004537f000000000409040500000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b75700000000000", @ANYRES32, @ANYBLOB="08f7490000005b3221605f00000000", @ANYRES32=0x0, @ANYBLOB="f400020040000100240001006c625f706f72745f7374617473000000000000000000000000080004000100010008000600"/60, @ANYRES32, @ANYBLOB="3c0001007c656e61626c6564000000000000000000000000001800030006000000040004000800064e00"/56, @ANYRES32], 0x15}, 0x1, 0x0, 0x0, 0xc0}, 0x8000004) r9 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_timeval(r9, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0x7530}, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000400)={'hsr0\x00', 0x0}) r11 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_timeval(r11, 0x1, 0x14, &(0x7f0000abaff9)={0x0, 0x7530}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r13}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002e00070200"/19, @ANYRES32=r13, @ANYBLOB="ecff1200071c0e00000000de"], 0x3}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f00000004c0)={'vxcan0\x00', r13}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000640)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="10010000f5e246b147675a33ab983a3a1d214dbdf72c8dcbc51feb8526c161b476888f53a38ba694b4eba71ac77bf5db7b2aed372b7671ace9654ae90657360b9c64454b6e8a734f37808a1ec7b908ebda84445b52b828e4ecff0110e7303464848694b5c3689b51082d3e92b0ce4fd37b9b9d2a6a25d6a1c2ffa96035edd6f8503cbb4300", @ANYRES16=r6, @ANYBLOB="20002abd7000ffdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="f40002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r10, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f366000008000600", @ANYRES32=r14], 0x110}, 0x1, 0x0, 0x0, 0x24000042}, 0x10) syz_open_procfs(0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, 0xffffffffffffffff, 0x42369000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'s\x05\x00\x00\x80\x04\x00'}) socket$packet(0x11, 0x3, 0x300) 12:25:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80812, r3, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2689.570803] device bridge_slave_1 left promiscuous mode [ 2689.576386] bridge0: port 2(bridge_slave_1) entered disabled state [ 2689.722992] device bridge_slave_0 left promiscuous mode [ 2689.728546] bridge0: port 1(bridge_slave_0) entered disabled state 12:25:35 executing program 4: setresuid(0x0, 0xfffe, 0xffffffffffffffff) r0 = socket(0x2, 0x80002, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 12:25:35 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a6ff3b8e849ed39, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() syz_open_procfs(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b62, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/193) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x9) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x7, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@dev]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 2690.062909] device hsr_slave_1 left promiscuous mode [ 2690.126214] device hsr_slave_0 left promiscuous mode [ 2690.204383] team0 (unregistering): Port device team_slave_1 removed [ 2690.250862] team0 (unregistering): Port device team_slave_0 removed [ 2690.279975] bond0 (unregistering): Releasing backup interface bond_slave_1 12:25:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2690.338714] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2690.498519] bond0 (unregistering): Released all slaves 12:25:36 executing program 1: set_mempolicy(0x8001, &(0x7f0000000040)=0x8000000000005c9, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x1ff) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@remote}, 0x14) sendto(0xffffffffffffffff, 0x0, 0x0, 0x30008020, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x3, 0x3, 0x2}}, 0x80) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x280000, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 12:25:36 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a6ff3b8e849ed39, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() syz_open_procfs(0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b62, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/193) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x9) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x7, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@dev]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 2690.767259] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2690.790197] net_ratelimit: 22 callbacks suppressed [ 2690.790204] protocol 88fb is buggy, dev hsr_slave_0 [ 2690.800651] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.030349] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.035508] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.990262] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.996169] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.491572] IPVS: ftp: loaded support on port[0] = 21 [ 2692.710260] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.715649] protocol 88fb is buggy, dev hsr_slave_1 [ 2692.870224] protocol 88fb is buggy, dev hsr_slave_0 [ 2692.875406] protocol 88fb is buggy, dev hsr_slave_1 [ 2693.403889] chnl_net:caif_netlink_parms(): no params data found [ 2693.443540] bridge0: port 1(bridge_slave_0) entered blocking state [ 2693.450251] bridge0: port 1(bridge_slave_0) entered disabled state [ 2693.457430] device bridge_slave_0 entered promiscuous mode [ 2693.465466] bridge0: port 2(bridge_slave_1) entered blocking state [ 2693.472022] bridge0: port 2(bridge_slave_1) entered disabled state [ 2693.479236] device bridge_slave_1 entered promiscuous mode [ 2693.498903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2693.508695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2693.528050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2693.535451] team0: Port device team_slave_0 added [ 2693.541326] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2693.548836] team0: Port device team_slave_1 added [ 2693.554945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2693.562533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2693.623886] device hsr_slave_0 entered promiscuous mode [ 2693.660609] device hsr_slave_1 entered promiscuous mode [ 2693.701038] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2693.708425] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2693.724616] bridge0: port 2(bridge_slave_1) entered blocking state [ 2693.731047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2693.737813] bridge0: port 1(bridge_slave_0) entered blocking state [ 2693.744984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2693.778929] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2693.785430] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2693.796128] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2693.806122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2693.813554] bridge0: port 1(bridge_slave_0) entered disabled state [ 2693.820901] bridge0: port 2(bridge_slave_1) entered disabled state [ 2693.831024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2693.837186] 8021q: adding VLAN 0 to HW filter on device team0 [ 2693.847577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2693.855265] bridge0: port 1(bridge_slave_0) entered blocking state [ 2693.861849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2693.872625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2693.880419] bridge0: port 2(bridge_slave_1) entered blocking state [ 2693.886936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2693.907126] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2693.917242] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2693.928234] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2693.935471] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2693.943298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2693.952603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2693.960269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2693.968164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2693.975174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2693.988300] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2693.997318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2694.004190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2694.016247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2694.390607] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:25:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x2081fc) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) epoll_create1(0x0) 12:25:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = geteuid() r3 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', 0x0, &(0x7f0000000280)='9p\x00', 0x4000, &(0x7f0000000640)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_uid={'access'}}, {@dfltgid={'dfltgid', 0x3d, 0xffffffffffffffff}}, {@access_any='access=any'}, {@fscache='fscache'}], [{@euid_lt={'euid<'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62], 0x2d, [0x0, 0x119fd552c2434261]}}}]}}) lstat(&(0x7f00000001c0)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0200000001000407cf7d328de41f00", @ANYRES32=r2, @ANYBLOB="0000fe00000000", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32, @ANYBLOB="0400ac00348204be0000f3", @ANYRES32, @ANYBLOB="10000100000000002000060000000000"], 0x9, 0x1) r4 = geteuid() r5 = getuid() r6 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, 0x0) lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="0000fe00000000", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r7, @ANYBLOB="040004000000000008001974", @ANYRES32=r8, @ANYBLOB="10000100000000002000060000000000"], 0x9, 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x47b74f0be1bda4, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r9 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140), 0x4) r10 = accept4(0xffffffffffffffff, &(0x7f00000003c0)=@nl, &(0x7f00000004c0)=0x80, 0x800) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000500)='team_slave_1\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)) read(0xffffffffffffffff, 0x0, 0x6c00) ioctl$KVM_GET_VCPU_EVENTS(r9, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'veth0_to_bridge\x00', @ifru_flags=0x800}}) 12:25:40 executing program 2: socket$inet(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40058000}, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dfv/vga_arbiter\x00', 0x2000, 0x0) epoll_create1(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000000000080000000000002679da192941759d6260a7cefc97d25b42bb6dce788e7c2a1478741d465bee657c9f6a034eb34131cdb91afc0387cfa730508d3e9d18cf4e91b285c48cefc613c1e0102933c2aceac705f25fbc1235ccb3e87106e97c611f9c744466f3b92026102f8bd0b24171426cfbd556b9afcbf3d121e4ae6c830b783e59af0adaba282c17261f2ad127af81c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002c00070500"/20, @ANYRES32=r4, @ANYBLOB="7bda00000040feff3f3353000c0001e7ff0400000000000000000200"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000408}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=@bridge_getneigh={0x1b4, 0x1e, 0x0, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40001}, [@IFLA_NET_NS_FD={0x8}, @IFLA_CARRIER={0x8, 0x21, 0xf8}, @IFLA_VF_PORTS={0x160, 0x18, [{0x54, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xf8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "34ff5a02e3656419f875a97b4c477f46"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a2c6b1281914a6eab609261e52881819"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1f}]}, {0x90, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0f93dd48b82f4db2ccb3d7cdd3aef0d4"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "78ccf0e7f9e8a60afb9f3169fed7ac7c"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'vboxnet0\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "82505282d4684a5413cc8144518d88e8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "609f80024eba2949e2446bb2b81f7769"}, @IFLA_PORT_VF={0x8, 0x1, 0xffffff7f}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b658ea0bbfc374a45fee53dee809a28e"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x4}]}, {0x3c, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "867e7b0a1f20e61552504e848d0af7d8"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x8, 0x2, '@\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2841c74e0c89600c9648ac9b6d302024"}]}, {0x3c, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "598966812869e33a3749fc186b0d5b18"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c05e1c75f4ec5a7f4377ac84fda81eea"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x40}]}]}, @IFLA_AF_SPEC={0x10, 0x1a, [{0x4, 0xa}, {0x4, 0xfae1b8555c332eba}, {0x4, 0xa}]}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xc, 0x1, @random="2b7fa8f94beb"}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40000}, 0x20040810) r5 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000506050368fe07602b00003f0e430a001400020045b300070300000319001a00120002000e00010006000300"/57, 0x39}], 0x1) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'xrlan0\x00\x00\x00\x00\x00\x10\x00', 0x2}, 0x18) 12:25:40 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r1, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r1, 0x1, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:25:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000000)={0xd35, 0xfff}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000400)=0x1000) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) prctl$PR_GET_ENDIAN(0x13, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$KVM_ASSIGN_SET_MSIX_NR(r3, 0x4008ae73, &(0x7f0000000280)={0x3, 0xff}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r4, 0x890b, &(0x7f00000000c0)={'ifb0\x02\x00\x00\x00\x00\x00\xb2\xa7\r\x93\x00', @ifru_map}) pipe(&(0x7f0000000180)) syz_open_dev$loop(0x0, 0x0, 0x145002) [ 2695.346648] 9pnet: Insufficient options for proto=fd 12:25:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:41 executing program 1: bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0xeda1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x0, 0x0) io_setup(0x0, &(0x7f00000001c0)=0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r0, 0x0, 0x0) io_submit(r0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$revoke(0x3, 0x0) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0x90000001}) epoll_wait(r3, &(0x7f0000000180)=[{}], 0x1, 0xffffffffffffffff) vmsplice(r1, &(0x7f0000000340)=[{&(0x7f0000000500), 0xfffffffffffffe78}], 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') pipe(0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000000c0)={0x4, 0x1, &(0x7f0000000200)=':'}) [ 2695.418118] audit: type=1326 audit(1574166341.020:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10013 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x0 12:25:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2695.479639] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 12:25:41 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2696.150516] net_ratelimit: 19 callbacks suppressed [ 2696.150522] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.160710] protocol 88fb is buggy, dev hsr_slave_1 [ 2696.229118] audit: type=1326 audit(1574166341.830:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10013 comm="syz-executor.4" exe="/root/syz-executor.4" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d47a code=0x0 12:25:41 executing program 1: creat(0x0, 0x0) set_mempolicy(0x8001, &(0x7f0000000040)=0x8000000000005c9, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f00000000c0)={0x10000, &(0x7f0000000040), 0xc}) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="6521ab2d94f6319c5fc9cc14c02148e28229b601000000213f4bb050ba2341fa21361fbfcde377cec1128d813ef106a519dfb0d31a44f6b91d11a7c9605b6001581bef50d1512415ade0c9de50b72460a07b42d53411a5e7ee0902086bf28b827b8a2ed0d5b97d4d48af22566f44b7970c639f6771e2aff7a885fb0c0dc8e72a13ae00000000a6012d012d88754e1b4d1a3f84fcd54c02b0ddd22eb661990dd40486cf95da94e1a96fa3ed8ec257f5822065"]) openat(r2, &(0x7f0000000380)='./bus\x00', 0x0, 0x20) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x1ff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) sendto(0xffffffffffffffff, &(0x7f0000000240)="65f167fdf0ff40c5bcfb6618bbaf9a36fc0d666e362eea9be60786bdc7fb98709cadd82110dc94a4e6e32bc013a310f9d02579585d5bc9694e6c4a60f40cb676c5143dea427e5183563f7078430f00b28beb2e447793db96ae5606535e27c57fd3f76f92d9db568d6ccd71c02f8d384df2b09f13144e83f432ebdc91dbda5957ea7779dd1f0de7a91a9c2750985d", 0x8e, 0x30008020, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1, 0x3, 0x3, 0x2}}, 0x80) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x280000, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) 12:25:41 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f00000000c0)=0x2003ff, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) bind$inet6(r0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket(0x0, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, &(0x7f0000000740)=""/177, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) 12:25:42 executing program 2: socket$inet(0x10, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000400)) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40058000}, 0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dfv/vga_arbiter\x00', 0x2000, 0x0) epoll_create1(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="480000002400070500"/20, @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c00020018000200030000000001000000000000080000000000002679da192941759d6260a7cefc97d25b42bb6dce788e7c2a1478741d465bee657c9f6a034eb34131cdb91afc0387cfa730508d3e9d18cf4e91b285c48cefc613c1e0102933c2aceac705f25fbc1235ccb3e87106e97c611f9c744466f3b92026102f8bd0b24171426cfbd556b9afcbf3d121e4ae6c830b783e59af0adaba282c17261f2ad127af81c0"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002c00070500"/20, @ANYRES32=r4, @ANYBLOB="7bda00000040feff3f3353000c0001e7ff0400000000000000000200"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000408}, 0xc, &(0x7f0000000340)={&(0x7f00000004c0)=@bridge_getneigh={0x1b4, 0x1e, 0x0, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x40001}, [@IFLA_NET_NS_FD={0x8}, @IFLA_CARRIER={0x8, 0x21, 0xf8}, @IFLA_VF_PORTS={0x160, 0x18, [{0x54, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x2}, @IFLA_PORT_REQUEST={0x8, 0x6, 0xf8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "34ff5a02e3656419f875a97b4c477f46"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a2c6b1281914a6eab609261e52881819"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1f}]}, {0x90, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0f93dd48b82f4db2ccb3d7cdd3aef0d4"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "78ccf0e7f9e8a60afb9f3169fed7ac7c"}, @IFLA_PORT_PROFILE={0x10, 0x2, 'vboxnet0\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "82505282d4684a5413cc8144518d88e8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "609f80024eba2949e2446bb2b81f7769"}, @IFLA_PORT_VF={0x8, 0x1, 0xffffff7f}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b658ea0bbfc374a45fee53dee809a28e"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x4}]}, {0x3c, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "867e7b0a1f20e61552504e848d0af7d8"}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x8, 0x2, '@\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "2841c74e0c89600c9648ac9b6d302024"}]}, {0x3c, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "598966812869e33a3749fc186b0d5b18"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c05e1c75f4ec5a7f4377ac84fda81eea"}, @IFLA_PORT_PROFILE={0x8, 0x2, '\x00'}, @IFLA_PORT_REQUEST={0x8, 0x6, 0x40}]}]}, @IFLA_AF_SPEC={0x10, 0x1a, [{0x4, 0xa}, {0x4, 0xfae1b8555c332eba}, {0x4, 0xa}]}, @IFLA_MASTER={0x8, 0xa, r4}, @IFLA_ADDRESS={0xc, 0x1, @random="2b7fa8f94beb"}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x40000}, 0x20040810) r5 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r6 = socket$netlink(0x10, 0x3, 0xc) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000080)="390000000506050368fe07602b00003f0e430a001400020045b300070300000319001a00120002000e00010006000300"/57, 0x39}], 0x1) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000001c0)={0x0, 'xrlan0\x00\x00\x00\x00\x00\x10\x00', 0x2}, 0x18) 12:25:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x29) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x1000000f2) 12:25:42 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)={0x1, 0x0, [{0x1, 0x0, 0x0, 0xffffffff}]}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000780)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0xf0ffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) truncate(0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 2696.470119] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.475303] protocol 88fb is buggy, dev hsr_slave_1 12:25:42 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r1 = socket$kcm(0xa, 0x122000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:42 executing program 1: 12:25:42 executing program 1: 12:25:42 executing program 4: [ 2696.668694] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2696.830588] device bridge_slave_1 left promiscuous mode [ 2696.836133] bridge0: port 2(bridge_slave_1) entered disabled state [ 2696.870161] protocol 88fb is buggy, dev hsr_slave_0 [ 2696.875338] protocol 88fb is buggy, dev hsr_slave_1 [ 2696.891382] device bridge_slave_0 left promiscuous mode [ 2696.896999] bridge0: port 1(bridge_slave_0) entered disabled state [ 2697.021910] device hsr_slave_1 left promiscuous mode [ 2697.030173] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.035297] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.073011] device hsr_slave_0 left promiscuous mode [ 2697.133320] team0 (unregistering): Port device team_slave_1 removed [ 2697.145640] team0 (unregistering): Port device team_slave_0 removed [ 2697.155612] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2697.213238] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2697.270212] protocol 88fb is buggy, dev hsr_slave_0 [ 2697.275356] protocol 88fb is buggy, dev hsr_slave_1 [ 2697.304453] bond0 (unregistering): Released all slaves [ 2698.991618] IPVS: ftp: loaded support on port[0] = 21 [ 2699.961070] chnl_net:caif_netlink_parms(): no params data found [ 2699.997492] bridge0: port 1(bridge_slave_0) entered blocking state [ 2700.004171] bridge0: port 1(bridge_slave_0) entered disabled state [ 2700.011576] device bridge_slave_0 entered promiscuous mode [ 2700.018356] bridge0: port 2(bridge_slave_1) entered blocking state [ 2700.025033] bridge0: port 2(bridge_slave_1) entered disabled state [ 2700.032854] device bridge_slave_1 entered promiscuous mode [ 2700.051783] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2700.061721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2700.078784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2700.086243] team0: Port device team_slave_0 added [ 2700.092469] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2700.099577] team0: Port device team_slave_1 added [ 2700.105588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2700.113324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2700.172466] device hsr_slave_0 entered promiscuous mode [ 2700.230630] device hsr_slave_1 entered promiscuous mode [ 2700.291001] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2700.298467] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2700.314679] bridge0: port 2(bridge_slave_1) entered blocking state [ 2700.321140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2700.327739] bridge0: port 1(bridge_slave_0) entered blocking state [ 2700.334177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2700.364197] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2700.370508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2700.378929] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2700.387763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2700.395345] bridge0: port 1(bridge_slave_0) entered disabled state [ 2700.402224] bridge0: port 2(bridge_slave_1) entered disabled state [ 2700.413114] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2700.419319] 8021q: adding VLAN 0 to HW filter on device team0 [ 2700.428607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2700.437502] bridge0: port 1(bridge_slave_0) entered blocking state [ 2700.444018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2700.454040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2700.462099] bridge0: port 2(bridge_slave_1) entered blocking state [ 2700.468532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2700.484102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2700.492274] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2700.502702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2700.513272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2700.526114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2700.535771] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2700.542684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2700.555999] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2700.564274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2700.571422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2700.582510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2700.960556] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2701.190295] net_ratelimit: 20 callbacks suppressed [ 2701.190301] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.200370] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.430404] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.435708] protocol 88fb is buggy, dev hsr_slave_1 12:25:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:47 executing program 1: 12:25:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:47 executing program 4: 12:25:47 executing program 2: 12:25:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:47 executing program 4: 12:25:47 executing program 1: 12:25:47 executing program 4: 12:25:47 executing program 2: 12:25:47 executing program 1: 12:25:47 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:47 executing program 1: 12:25:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:47 executing program 4: 12:25:47 executing program 1: 12:25:47 executing program 4: [ 2702.390282] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.395395] protocol 88fb is buggy, dev hsr_slave_1 12:25:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:48 executing program 4: 12:25:48 executing program 1: 12:25:48 executing program 2: 12:25:48 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:48 executing program 4: 12:25:48 executing program 1: 12:25:48 executing program 4: [ 2702.624635] device bridge_slave_1 left promiscuous mode [ 2702.632390] bridge0: port 2(bridge_slave_1) entered disabled state [ 2702.710772] device bridge_slave_0 left promiscuous mode [ 2702.721543] bridge0: port 1(bridge_slave_0) entered disabled state [ 2702.892647] device hsr_slave_1 left promiscuous mode [ 2702.935252] device hsr_slave_0 left promiscuous mode [ 2702.975593] team0 (unregistering): Port device team_slave_1 removed [ 2702.986816] team0 (unregistering): Port device team_slave_0 removed [ 2702.998736] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2703.026453] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2703.095712] bond0 (unregistering): Released all slaves [ 2703.110209] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.115369] protocol 88fb is buggy, dev hsr_slave_1 [ 2703.270234] protocol 88fb is buggy, dev hsr_slave_0 [ 2703.275419] protocol 88fb is buggy, dev hsr_slave_1 [ 2704.791436] IPVS: ftp: loaded support on port[0] = 21 [ 2706.127743] chnl_net:caif_netlink_parms(): no params data found [ 2706.163101] bridge0: port 1(bridge_slave_0) entered blocking state [ 2706.169960] bridge0: port 1(bridge_slave_0) entered disabled state [ 2706.177213] device bridge_slave_0 entered promiscuous mode [ 2706.185045] bridge0: port 2(bridge_slave_1) entered blocking state [ 2706.192018] bridge0: port 2(bridge_slave_1) entered disabled state [ 2706.199396] device bridge_slave_1 entered promiscuous mode [ 2706.218535] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2706.228044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2706.248344] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2706.255714] team0: Port device team_slave_0 added [ 2706.271780] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2706.288497] team0: Port device team_slave_1 added [ 2706.296506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2706.304717] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2706.362461] device hsr_slave_0 entered promiscuous mode [ 2706.420482] device hsr_slave_1 entered promiscuous mode [ 2706.480942] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2706.488306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2706.504244] bridge0: port 2(bridge_slave_1) entered blocking state [ 2706.511793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2706.518655] bridge0: port 1(bridge_slave_0) entered blocking state [ 2706.525127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2706.550120] net_ratelimit: 10 callbacks suppressed [ 2706.550125] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.560183] protocol 88fb is buggy, dev hsr_slave_1 [ 2706.572273] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2706.578364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2706.587071] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2706.597041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2706.604205] bridge0: port 1(bridge_slave_0) entered disabled state [ 2706.622149] bridge0: port 2(bridge_slave_1) entered disabled state [ 2706.632310] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2706.638776] 8021q: adding VLAN 0 to HW filter on device team0 [ 2706.648919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2706.656597] bridge0: port 1(bridge_slave_0) entered blocking state [ 2706.663101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2706.672573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2706.680915] bridge0: port 2(bridge_slave_1) entered blocking state [ 2706.687350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2706.710782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2706.718697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2706.726466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2706.734461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2706.743037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2706.752682] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2706.760354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2706.773776] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2706.784291] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2706.791721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2706.805049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2706.880210] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.885331] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.000177] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.005315] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.110761] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2707.130176] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.135287] protocol 88fb is buggy, dev hsr_slave_1 [ 2707.250163] protocol 88fb is buggy, dev hsr_slave_0 [ 2707.255261] protocol 88fb is buggy, dev hsr_slave_1 12:25:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:53 executing program 4: 12:25:53 executing program 1: 12:25:53 executing program 2: 12:25:53 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:53 executing program 4: 12:25:53 executing program 1: 12:25:53 executing program 4: 12:25:53 executing program 1: 12:25:53 executing program 4: 12:25:53 executing program 1: 12:25:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:53 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x1000000002714, 0x0, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000240)="4da25e7d0d2bf2769a4cf63cb91c4811e12489034adf7a83fec8db588f859810dab6411b2601c77cb5df1451214a2b3666e72d0995e063bb159b581bfa7f4e66", 0x0}, 0x20) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000280)={0x60000006}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) close(0xffffffffffffffff) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r5, r6, 0x0, 0x102000002) 12:25:54 executing program 1: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x8001004000000016) 12:25:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x14, 0x0, &(0x7f00000002c0)) 12:25:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:54 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x1000000002714, 0x0, &(0x7f00000000c0)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000240)="4da25e7d0d2bf2769a4cf63cb91c4811e12489034adf7a83fec8db588f859810dab6411b2601c77cb5df1451214a2b3666e72d0995e063bb159b581bfa7f4e66", 0x0}, 0x20) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000280)={0x60000006}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) close(0xffffffffffffffff) pwritev(r7, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r5, r6, 0x0, 0x102000002) 12:25:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:25:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x0, 0x100) 12:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x4, 0x101}, 0x3c) 12:25:54 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:25:54 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690d778a39f102c92a9f55b29d2bc39a8cc9fe5d62dbcf4f83ebe0fbdc1dbc1e6", 0x7f}], 0x1}], 0x1, 0x0) sendto$unix(r3, &(0x7f0000000280)="026e67da7aa60c23742d4e88f62f924dcdb716a9fd7b814e3d1b2053b3264e22168f1f286ff20a8af24f6cea8c69d83983478051537296a303844101f66de15e213c6544da6e03216137e8f1f0ee65f2a8c8c7b6f35a79b29cd8441b6ac745aba3722730999b8a0b7e134ba9473fe4a2f6f93008667d92d04660ed5a0d56514d1d578383b31c37dfc97671b87c88708dff0ec864079650d4d55a6d363e45f00bf5768ca8506758943e355f2abb076d62370c05128468132e96a4eb72799e79bb5526b6bdb903ea5e1521bf919ecf0d8fcd7fec98", 0xd4, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r1, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) r4 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r5 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r4, 0x4b67, &(0x7f0000000200)={0x5, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00, 0x1}, {0x9, 0x1}, {0x4, 0x4}, {0x0, 0x7f}]}) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x4000000000dc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:25:54 executing program 4: socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0), 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10000}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, [], "800000e77f000400"}}}}}}}, 0x0) [ 2709.131009] device bridge_slave_1 left promiscuous mode [ 2709.136758] bridge0: port 2(bridge_slave_1) entered disabled state [ 2709.201319] device bridge_slave_0 left promiscuous mode [ 2709.208354] bridge0: port 1(bridge_slave_0) entered disabled state 12:25:54 executing program 4: socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0), 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10000}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x0, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @loopback, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, [], "800000e77f000400"}}}}}}}, 0x0) [ 2709.423337] device hsr_slave_1 left promiscuous mode 12:25:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x1000000002714, 0x0, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r1, &(0x7f0000f50f90), 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) [ 2709.475657] device hsr_slave_0 left promiscuous mode [ 2709.544367] team0 (unregistering): Port device team_slave_1 removed [ 2709.588387] team0 (unregistering): Port device team_slave_0 removed [ 2709.638043] bond0 (unregistering): Releasing backup interface bond_slave_1 12:25:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 2709.717930] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2709.878644] bond0 (unregistering): Released all slaves 12:25:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:25:56 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x6, 0x0, &(0x7f00000002c0)) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0x2a}], 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) [ 2711.600281] net_ratelimit: 18 callbacks suppressed [ 2711.600287] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.610615] protocol 88fb is buggy, dev hsr_slave_1 [ 2711.830223] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.835958] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.461637] IPVS: ftp: loaded support on port[0] = 21 [ 2712.790251] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.795432] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.348589] chnl_net:caif_netlink_parms(): no params data found [ 2713.388020] bridge0: port 1(bridge_slave_0) entered blocking state [ 2713.394804] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.402366] device bridge_slave_0 entered promiscuous mode [ 2713.409164] bridge0: port 2(bridge_slave_1) entered blocking state [ 2713.415884] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.424185] device bridge_slave_1 entered promiscuous mode [ 2713.441232] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2713.450715] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2713.471600] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2713.478866] team0: Port device team_slave_0 added [ 2713.484897] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2713.492184] team0: Port device team_slave_1 added [ 2713.498072] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2713.505819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2713.510165] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.517839] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.572541] device hsr_slave_0 entered promiscuous mode [ 2713.630472] device hsr_slave_1 entered promiscuous mode [ 2713.670396] protocol 88fb is buggy, dev hsr_slave_0 [ 2713.671075] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2713.675509] protocol 88fb is buggy, dev hsr_slave_1 [ 2713.683690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2713.702879] bridge0: port 2(bridge_slave_1) entered blocking state [ 2713.709389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2713.716199] bridge0: port 1(bridge_slave_0) entered blocking state [ 2713.722622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2713.754214] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2713.760847] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2713.769177] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2713.778639] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2713.786971] bridge0: port 1(bridge_slave_0) entered disabled state [ 2713.793745] bridge0: port 2(bridge_slave_1) entered disabled state [ 2713.804509] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2713.811180] 8021q: adding VLAN 0 to HW filter on device team0 [ 2713.820371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2713.828053] bridge0: port 1(bridge_slave_0) entered blocking state [ 2713.834753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2713.845235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2713.853461] bridge0: port 2(bridge_slave_1) entered blocking state [ 2713.859896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2713.881451] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2713.889387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2713.897430] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2713.906845] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2713.914827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2713.926131] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2713.932642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2713.946656] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2713.955662] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2713.962676] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2713.978626] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2714.331193] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:26:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r0 = add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000580)="297df4bf72e7153167c7ec54e86b386597f5de55c95a27ea5f1c2c9dfcef914663b98dfbc8dae5b4b445c33c79e0d8b174ea9c4008b93ed16392c2aba4f53c8751140ced8b8df7ebbe833a974c488c245782befeb46e467c00f3901799", 0x5d, r0) add_key(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x9918) dup3(r1, r3, 0x0) tkill(r2, 0x1002000000016) 12:26:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:00 executing program 0: socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 12:26:00 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690d778a39f102c92a9f55b29d2bc39a8cc9fe5d62dbcf4f83ebe0fbdc1dbc1e6", 0x7f}], 0x1}], 0x1, 0x0) sendto$unix(r3, &(0x7f0000000280)="026e67da7aa60c23742d4e88f62f924dcdb716a9fd7b814e3d1b2053b3264e22168f1f286ff20a8af24f6cea8c69d83983478051537296a303844101f66de15e213c6544da6e03216137e8f1f0ee65f2a8c8c7b6f35a79b29cd8441b6ac745aba3722730999b8a0b7e134ba9473fe4a2f6f93008667d92d04660ed5a0d56514d1d578383b31c37dfc97671b87c88708dff0ec864079650d4d55a6d363e45f00bf5768ca8506758943e355f2abb076d62370c05128468132e96a4eb72799e79bb5526b6bdb903ea5e1521bf919ecf0d8fcd7fec98", 0xd4, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r1, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) r4 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r5 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r4, 0x4b67, &(0x7f0000000200)={0x5, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00, 0x1}, {0x9, 0x1}, {0x4, 0x4}, {0x0, 0x7f}]}) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x4000000000dc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:26:00 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:00 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:00 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x1000000002714, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) r1 = creat(0x0, 0x20005d) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000280)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x10005, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r3, r4, 0x0, 0x102000002) 12:26:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:01 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x1000000002714, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) r1 = creat(0x0, 0x20005d) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000280)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(0xffffffffffffffff, 0x0, r5, 0x0, 0x10005, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r3, r4, 0x0, 0x102000002) 12:26:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), 0x4) 12:26:01 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:01 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={0x0, 0x0, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690", 0x60}], 0x1}], 0x1, 0x0) sendto$unix(r4, &(0x7f0000000280), 0x0, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r2, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r5 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r6 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00}, {0x9, 0x1}, {0x4, 0x4}]}) sendfile(r6, 0xffffffffffffffff, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) [ 2716.030642] device bridge_slave_1 left promiscuous mode [ 2716.039545] bridge0: port 2(bridge_slave_1) entered disabled state [ 2716.116557] device bridge_slave_0 left promiscuous mode [ 2716.127926] bridge0: port 1(bridge_slave_0) entered disabled state [ 2716.293138] device hsr_slave_1 left promiscuous mode [ 2716.333965] device hsr_slave_0 left promiscuous mode [ 2716.390005] team0 (unregistering): Port device team_slave_1 removed [ 2716.441565] team0 (unregistering): Port device team_slave_0 removed [ 2716.458612] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2716.563981] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2716.747302] bond0 (unregistering): Released all slaves 12:26:02 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r0, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690d778a39f102c92a9f55b29d2bc39a8cc9fe5d62dbcf4f83ebe0fbdc1dbc1e6", 0x7f}], 0x1}], 0x1, 0x0) sendto$unix(r3, &(0x7f0000000280)="026e67da7aa60c23742d4e88f62f924dcdb716a9fd7b814e3d1b2053b3264e22168f1f286ff20a8af24f6cea8c69d83983478051537296a303844101f66de15e213c6544da6e03216137e8f1f0ee65f2a8c8c7b6f35a79b29cd8441b6ac745aba3722730999b8a0b7e134ba9473fe4a2f6f93008667d92d04660ed5a0d56514d1d578383b31c37dfc97671b87c88708dff0ec864079650d4d55a6d363e45f00bf5768ca8506758943e355f2abb076d62370c05128468132e96a4eb72799e79bb5526b6bdb903ea5e1521bf919ecf0d8fcd7fec98", 0xd4, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r1, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r1, r1, &(0x7f0000000240), 0x2008000fffffffe) r4 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r5 = socket$inet6(0xa, 0x3, 0x0) sendfile(r5, 0xffffffffffffffff, &(0x7f0000000240), 0x4000000000dc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) [ 2716.950154] net_ratelimit: 20 callbacks suppressed [ 2716.950160] protocol 88fb is buggy, dev hsr_slave_0 [ 2716.960753] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.671425] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.677719] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.841601] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.847856] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.071432] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.077269] protocol 88fb is buggy, dev hsr_slave_1 12:26:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x1000000002714, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000240)="4da25e7d0d2bf2769a4cf63cb91c4811e12489034adf7a83fec8db588f859810dab6411b2601c77cb5df1451214a2b3666e72d0995e063bb159b581bfa7f4e66", 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000280)={0x60000006}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000280)={0x60000006}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x10005, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r5, r6, 0x0, 0x102000002) 12:26:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:03 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:03 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:03 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f6, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x40000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x1000000002714, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x40000, 0x0) listen(0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f0000000240)="4da25e7d0d2bf2769a4cf63cb91c4811e12489034adf7a83fec8db588f859810dab6411b2601c77cb5df1451214a2b3666e72d0995e063bb159b581bfa7f4e66", 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000280)={0x60000006}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0x101}, 0x13) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f00000000c0), 0x0}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000280)={0x60000006}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x10005, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r5, r6, 0x0, 0x102000002) [ 2719.030218] protocol 88fb is buggy, dev hsr_slave_0 [ 2719.035450] protocol 88fb is buggy, dev hsr_slave_1 [ 2719.261668] IPVS: ftp: loaded support on port[0] = 21 [ 2720.179938] chnl_net:caif_netlink_parms(): no params data found [ 2720.221595] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.228350] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.235584] device bridge_slave_0 entered promiscuous mode [ 2720.242949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.249698] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.256968] device bridge_slave_1 entered promiscuous mode [ 2720.276998] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2720.286489] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2720.304057] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2720.313249] team0: Port device team_slave_0 added [ 2720.319007] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2720.326511] team0: Port device team_slave_1 added [ 2720.332358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2720.339894] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2720.402707] device hsr_slave_0 entered promiscuous mode [ 2720.440618] device hsr_slave_1 entered promiscuous mode [ 2720.492049] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2720.499380] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2720.515916] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.522342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2720.528941] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.535377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2720.567819] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2720.574095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2720.583456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2720.593660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2720.602009] bridge0: port 1(bridge_slave_0) entered disabled state [ 2720.608957] bridge0: port 2(bridge_slave_1) entered disabled state [ 2720.619989] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2720.626985] 8021q: adding VLAN 0 to HW filter on device team0 [ 2720.636105] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2720.644159] bridge0: port 1(bridge_slave_0) entered blocking state [ 2720.650582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2720.660738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2720.668542] bridge0: port 2(bridge_slave_1) entered blocking state [ 2720.674969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2720.691448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2720.699203] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2720.709537] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2720.719868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2720.731478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2720.740921] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2720.747024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2720.762436] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2720.770344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2720.777079] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2720.788579] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2721.170973] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 2721.990149] net_ratelimit: 18 callbacks suppressed [ 2721.990156] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.000283] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.230366] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.235514] protocol 88fb is buggy, dev hsr_slave_1 12:26:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:08 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) 12:26:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:08 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={0x0, 0x0, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690", 0x60}], 0x1}], 0x1, 0x0) sendto$unix(r4, &(0x7f0000000280), 0x0, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r2, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r5 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r6 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00}, {0x9, 0x1}, {0x4, 0x4}]}) sendfile(r6, 0xffffffffffffffff, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:26:08 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={0x0, 0x0, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690", 0x60}], 0x1}], 0x1, 0x0) sendto$unix(r4, &(0x7f0000000280), 0x0, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r2, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r5 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r6 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00}, {0x9, 0x1}, {0x4, 0x4}]}) sendfile(r6, 0xffffffffffffffff, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:26:08 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:08 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) [ 2722.871377] audit: type=1400 audit(1574166368.470:1870): avc: denied { map } for pid=10356 comm="syz-executor.1" path="socket:[462536]" dev="sockfs" ino=462536 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 12:26:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2723.065918] audit: type=1804 audit(1574166368.660:1871): pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 [ 2723.191048] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.196936] protocol 88fb is buggy, dev hsr_slave_1 [ 2723.270163] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.275415] protocol 88fb is buggy, dev hsr_slave_1 [ 2723.297738] audit: type=1804 audit(1574166368.900:1872): pid=10361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:09 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) [ 2723.606590] audit: type=1804 audit(1574166369.210:1873): pid=10378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:09 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) 12:26:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2723.910315] protocol 88fb is buggy, dev hsr_slave_0 [ 2723.915478] protocol 88fb is buggy, dev hsr_slave_1 [ 2723.968011] audit: type=1804 audit(1574166369.570:1874): pid=10381 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:09 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) [ 2724.143769] device bridge_slave_1 left promiscuous mode [ 2724.166877] bridge0: port 2(bridge_slave_1) entered disabled state 12:26:09 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) [ 2724.261005] device bridge_slave_0 left promiscuous mode [ 2724.266566] bridge0: port 1(bridge_slave_0) entered disabled state [ 2724.276840] audit: type=1804 audit(1574166369.890:1875): pid=10391 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 [ 2724.413654] audit: type=1804 audit(1574166370.020:1876): pid=10394 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 [ 2724.582655] device hsr_slave_1 left promiscuous mode [ 2724.644041] device hsr_slave_0 left promiscuous mode [ 2724.684745] team0 (unregistering): Port device team_slave_1 removed [ 2724.743338] team0 (unregistering): Port device team_slave_0 removed [ 2724.778033] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2724.862286] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2725.025100] bond0 (unregistering): Released all slaves 12:26:11 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={0x0, 0x0, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690", 0x60}], 0x1}], 0x1, 0x0) sendto$unix(r4, &(0x7f0000000280), 0x0, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r2, &(0x7f0000001cc0)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r5 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r6 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00}, {0x9, 0x1}, {0x4, 0x4}]}) sendfile(r6, 0xffffffffffffffff, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:26:11 executing program 2: socket$inet6(0xa, 0x20000000080002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000001c0)) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000380)) socket$inet(0x10, 0x3, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() eventfd2(0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="34660f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 12:26:11 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) 12:26:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:11 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:11 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) write$9p(0xffffffffffffffff, &(0x7f0000000200)="9f00ebc3ef1b6238e622ebe15e155bc96b5eb9bf3297323a5231009924bb1c8586b63c8ddd1881059772a039c55cfeec7b996364cdebe59a694b56c00d6a7f8ddf6376ee5fa175ddb1a59fb48727bf82215d78269138a87dbaa7c7f2760908a4205e0b86b311da170d5349f13301b1e37fc2c79de081ff6b7432549ffbea05f86bd12c1ec592daa2d75333ca84356d1e", 0x90) [ 2726.325555] audit: type=1804 audit(1574166371.930:1877): pid=10404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 [ 2726.414837] ptrace attach of "/root/syz-executor.2"[10413] was attempted by "/root/syz-executor.2"[10422] [ 2726.536234] audit: type=1804 audit(1574166372.140:1878): pid=10425 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 [ 2727.350164] net_ratelimit: 12 callbacks suppressed [ 2727.350170] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.360352] protocol 88fb is buggy, dev hsr_slave_1 [ 2727.651517] IPVS: ftp: loaded support on port[0] = 21 [ 2728.070474] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.075672] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.230195] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.235558] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.470203] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.475386] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.581736] chnl_net:caif_netlink_parms(): no params data found [ 2728.617394] bridge0: port 1(bridge_slave_0) entered blocking state [ 2728.624037] bridge0: port 1(bridge_slave_0) entered disabled state [ 2728.631465] device bridge_slave_0 entered promiscuous mode [ 2728.638987] bridge0: port 2(bridge_slave_1) entered blocking state [ 2728.645639] bridge0: port 2(bridge_slave_1) entered disabled state [ 2728.653186] device bridge_slave_1 entered promiscuous mode [ 2728.670375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2728.679461] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2728.699665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2728.707067] team0: Port device team_slave_0 added [ 2728.713032] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2728.720595] team0: Port device team_slave_1 added [ 2728.726127] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2728.734222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2728.802620] device hsr_slave_0 entered promiscuous mode [ 2728.840570] device hsr_slave_1 entered promiscuous mode [ 2728.881117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2728.888459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2728.904220] bridge0: port 2(bridge_slave_1) entered blocking state [ 2728.910759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2728.917351] bridge0: port 1(bridge_slave_0) entered blocking state [ 2728.923764] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2728.957216] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2728.964259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2728.974779] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2728.985397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2728.993295] bridge0: port 1(bridge_slave_0) entered disabled state [ 2729.001579] bridge0: port 2(bridge_slave_1) entered disabled state [ 2729.012040] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2729.018864] 8021q: adding VLAN 0 to HW filter on device team0 [ 2729.029503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2729.037287] bridge0: port 1(bridge_slave_0) entered blocking state [ 2729.043705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2729.054593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2729.062645] bridge0: port 2(bridge_slave_1) entered blocking state [ 2729.068994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2729.086879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2729.094898] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2729.112031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2729.119652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2729.127964] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2729.138278] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2729.144707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2729.157727] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2729.165944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2729.173416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2729.185866] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2729.260327] protocol 88fb is buggy, dev hsr_slave_0 [ 2729.265480] protocol 88fb is buggy, dev hsr_slave_1 [ 2729.570685] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:26:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:15 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:15 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) gettid() connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, 0x0, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) 12:26:15 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x269) 12:26:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:15 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000480)={0x0, 0x0, 0x3ff}) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) syz_open_dev$vbi(0x0, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$P9_ROPEN(r1, &(0x7f0000000640)={0x18, 0x71, 0x1, {{0x1, 0x4, 0x4}}}, 0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000008e40)=[{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)="e2e031fc14108c3dece7af041b53abd6c207ec2a45b0001a7245863240fa03eff807044ee19cc432907b63cf3d5c60090054c4122c8ddf74190c10792ce83003d27231f93b607144ecfb106f49fa76c066025334f19c640cef3bcfa70267f690", 0x60}], 0x1}], 0x1, 0x0) sendto$unix(r4, &(0x7f0000000280), 0x0, 0x1, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) write$UHID_INPUT(r2, &(0x7f0000001cc0)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) r5 = syz_open_dev$sndpcmp(0x0, 0x9a9, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000600), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r6 = socket$inet6(0xa, 0x3, 0x0) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000200)={0x4, &(0x7f0000000100)=[{0x400, 0x4}, {0x3f00}, {0x9, 0x1}, {0x4, 0x4}]}) sendfile(r6, 0xffffffffffffffff, &(0x7f0000000240), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0xe5) 12:26:15 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x0, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:16 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) 12:26:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) lseek(r0, 0x0, 0x0) r1 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2730.369410] audit: type=1804 audit(1574166375.970:1879): pid=10448 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:16 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x20a81) 12:26:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2730.602790] audit: type=1804 audit(1574166376.200:1880): pid=10472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:16 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = getpid() r5 = getpid() r6 = getpid() rt_tgsigqueueinfo(r6, r5, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r5) ptrace$pokeuser(0x6, r4, 0x0, 0x0) [ 2730.816970] audit: type=1804 audit(1574166376.420:1881): pid=10477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="dmmidi0" dev="sda1" ino=17185 res=1 12:26:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:16 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x16, &(0x7f0000000100)) ptrace(0xffffffffffffffff, r4) [ 2731.380511] device bridge_slave_1 left promiscuous mode [ 2731.386275] bridge0: port 2(bridge_slave_1) entered disabled state [ 2731.463227] device bridge_slave_0 left promiscuous mode [ 2731.468921] bridge0: port 1(bridge_slave_0) entered disabled state [ 2731.822417] device hsr_slave_1 left promiscuous mode [ 2731.856123] device hsr_slave_0 left promiscuous mode [ 2731.934133] team0 (unregistering): Port device team_slave_1 removed [ 2732.107466] team0 (unregistering): Port device team_slave_0 removed [ 2732.123666] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2732.175037] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2732.387996] bond0 (unregistering): Released all slaves [ 2732.393453] net_ratelimit: 18 callbacks suppressed [ 2732.393458] protocol 88fb is buggy, dev hsr_slave_0 [ 2732.393528] protocol 88fb is buggy, dev hsr_slave_1 12:26:18 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000900)={'veth0\x00'}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) splice(r0, &(0x7f0000000380)=0x7f, r2, &(0x7f0000000440), 0x8, 0x1) gettid() setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x3c, @multicast2, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x2b}, 0x2c) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0xfffffffffffffebd) keyctl$get_keyring_id(0x0, 0x0, 0x344) 12:26:18 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x16, &(0x7f0000000100)) 12:26:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20004044, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @ipv4={[], [], @empty}}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000003c0)="ce", 0x1, 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) [ 2732.630126] protocol 88fb is buggy, dev hsr_slave_0 [ 2732.635286] protocol 88fb is buggy, dev hsr_slave_1 12:26:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:18 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:18 executing program 4: socket$inet6(0xa, 0x20000000080002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000001c0)) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000380)) socket$inet(0x10, 0x3, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet6(0xa, 0x2, 0x0) socket(0x11, 0x800000003, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() eventfd2(0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000300)) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="34660f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 2732.989029] ptrace attach of "/root/syz-executor.4"[10520] was attempted by "/root/syz-executor.4"[10521] [ 2733.174296] IPVS: set_ctl: invalid protocol: 60 224.0.0.2:0 [ 2733.590154] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.595391] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.928247] IPVS: set_ctl: invalid protocol: 60 224.0.0.2:0 [ 2734.310188] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.316384] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.470172] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.475392] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.661487] IPVS: ftp: loaded support on port[0] = 21 [ 2735.689251] chnl_net:caif_netlink_parms(): no params data found [ 2735.727588] bridge0: port 1(bridge_slave_0) entered blocking state [ 2735.734262] bridge0: port 1(bridge_slave_0) entered disabled state [ 2735.741410] device bridge_slave_0 entered promiscuous mode [ 2735.748841] bridge0: port 2(bridge_slave_1) entered blocking state [ 2735.755619] bridge0: port 2(bridge_slave_1) entered disabled state [ 2735.763013] device bridge_slave_1 entered promiscuous mode [ 2735.781815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2735.791593] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2735.808593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2735.816236] team0: Port device team_slave_0 added [ 2735.823273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2735.830983] team0: Port device team_slave_1 added [ 2735.836609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2735.844597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2735.912684] device hsr_slave_0 entered promiscuous mode [ 2735.950563] device hsr_slave_1 entered promiscuous mode [ 2735.990898] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2735.998408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2736.012425] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.019027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2736.025711] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.032093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2736.065079] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2736.072045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2736.081381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2736.089983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2736.097665] bridge0: port 1(bridge_slave_0) entered disabled state [ 2736.105366] bridge0: port 2(bridge_slave_1) entered disabled state [ 2736.115050] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2736.121592] 8021q: adding VLAN 0 to HW filter on device team0 [ 2736.130453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2736.138026] bridge0: port 1(bridge_slave_0) entered blocking state [ 2736.144436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2736.160921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2736.168594] bridge0: port 2(bridge_slave_1) entered blocking state [ 2736.174984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2736.183567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2736.192282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2736.204168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2736.216707] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2736.228456] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2736.238916] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2736.245979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2736.253791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2736.262045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2736.276165] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2736.283922] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2736.291487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2736.302319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2736.670660] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:26:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:23 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/icmp\x00') readv(r0, &(0x7f0000002340), 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000001600)={0x5, 0x8000, 0x5, 0x101, 0x9, 0x31aa}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0xd432}) pipe(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$loop(0x0, 0x0, 0x51d00) write(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x81ff) pipe(&(0x7f0000000300)) io_submit(0x0, 0x6, &(0x7f0000001400)=[0x0, 0x0, 0x0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x86, r2, &(0x7f0000001a00)="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", 0x1cf, 0xdf9b}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x8, 0x63, r3, &(0x7f00000007c0)="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", 0x92b, 0x2, 0x0, 0x1}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0xd57ea18703433360, 0x8, 0xffffffffffffffff, &(0x7f0000001440)="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", 0x162, 0x9, 0x0, 0x2}]) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, &(0x7f0000000200)=""/250, 0x50c7e5e2) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') r7 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) dup2(r7, r1) sendfile(r5, r6, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300), 0x12) 12:26:23 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() r4 = getpid() r5 = getpid() rt_tgsigqueueinfo(r5, r4, 0x16, &(0x7f0000000100)) 12:26:23 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:23 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000900)={'veth0\x00'}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) splice(r0, &(0x7f0000000380)=0x7f, r2, &(0x7f0000000440), 0x8, 0x1) gettid() setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x3c, @multicast2, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x2b}, 0x2c) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0xfffffffffffffebd) keyctl$get_keyring_id(0x0, 0x0, 0x344) 12:26:23 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:23 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() [ 2737.598686] IPVS: set_ctl: invalid protocol: 60 224.0.0.2:0 [ 2737.750207] net_ratelimit: 18 callbacks suppressed [ 2737.750212] protocol 88fb is buggy, dev hsr_slave_0 [ 2737.760374] protocol 88fb is buggy, dev hsr_slave_1 12:26:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:23 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() getpid() getpid() 12:26:23 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) close(r1) socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r1, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) 12:26:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 12:26:23 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() getpid() getpid() 12:26:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 12:26:23 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() getpid() [ 2738.296542] [ 2738.298781] ============================= [ 2738.303018] WARNING: suspicious RCU usage [ 2738.307177] 4.14.154 #0 Not tainted [ 2738.310807] ----------------------------- [ 2738.315842] include/linux/radix-tree.h:238 suspicious rcu_dereference_check() usage! [ 2738.323820] [ 2738.323820] other info that might help us debug this: [ 2738.323820] [ 2738.331982] [ 2738.331982] rcu_scheduler_active = 2, debug_locks = 1 [ 2738.339292] 2 locks held by syz-executor.4/10592: [ 2738.344186] #0: (&sb->s_type->i_mutex_key#12){+.+.}, at: [] shmem_add_seals+0x15e/0x1060 [ 2738.354218] #1: (&(&mapping->tree_lock)->rlock){-.-.}, at: [] shmem_add_seals+0x334/0x1060 [ 2738.364572] [ 2738.364572] stack backtrace: [ 2738.369111] CPU: 0 PID: 10592 Comm: syz-executor.4 Not tainted 4.14.154 #0 [ 2738.376220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2738.385665] Call Trace: [ 2738.388279] dump_stack+0x142/0x197 [ 2738.391925] ? vprintk_func+0x65/0x159 [ 2738.395835] lockdep_rcu_suspicious+0x153/0x15d [ 2738.400532] shmem_add_seals+0x9e0/0x1060 [ 2738.404706] ? shmem_put_link+0xe0/0xe0 [ 2738.408704] shmem_fcntl+0xf7/0x130 [ 2738.412353] do_fcntl+0x190/0xe10 [ 2738.416003] ? f_getown+0xb0/0xb0 [ 2738.419473] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2738.424421] ? selinux_file_fcntl+0x66/0x110 [ 2738.428843] ? security_file_fcntl+0x89/0xb0 [ 2738.433571] SyS_fcntl+0xd5/0x110 [ 2738.437048] ? do_fcntl+0xe10/0xe10 [ 2738.440777] do_syscall_64+0x1e8/0x640 [ 2738.444685] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2738.449552] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2738.454753] RIP: 0033:0x45a639 [ 2738.457950] RSP: 002b:00007fbe39c2fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 2738.465757] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a639 [ 2738.473143] RDX: 000000000000000d RSI: 0000000000000409 RDI: 0000000000000007 [ 2738.480433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2738.487716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbe39c306d4 [ 2738.495002] R13: 00000000004c1068 R14: 00000000004d3c60 R15: 00000000ffffffff [ 2738.510404] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.515573] protocol 88fb is buggy, dev hsr_slave_1 12:26:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(0x0, 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) [ 2738.630145] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.635358] protocol 88fb is buggy, dev hsr_slave_1 [ 2738.710301] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.715504] protocol 88fb is buggy, dev hsr_slave_1 [ 2738.870136] protocol 88fb is buggy, dev hsr_slave_0 [ 2738.875388] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.140596] device bridge_slave_1 left promiscuous mode [ 2739.146301] bridge0: port 2(bridge_slave_1) entered disabled state [ 2739.201122] device bridge_slave_0 left promiscuous mode [ 2739.207931] bridge0: port 1(bridge_slave_0) entered disabled state 12:26:24 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:24 executing program 2: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000900)={'veth0\x00'}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) splice(r0, &(0x7f0000000380)=0x7f, r2, &(0x7f0000000440), 0x8, 0x1) gettid() setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000100)={0x3c, @multicast2, 0x0, 0x0, 'lblcr\x00', 0x0, 0x0, 0x2b}, 0x2c) syz_open_procfs(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x4ff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000300)=0x200) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0xfffffffffffffebd) keyctl$get_keyring_id(0x0, 0x0, 0x344) 12:26:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r4, &(0x7f0000000300)='\x00', 0x1) sendfile(r3, r4, &(0x7f0000000000), 0x7) fcntl$addseals(r4, 0x409, 0xd) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) close(r4) 12:26:24 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) getpid() [ 2739.413067] device hsr_slave_1 left promiscuous mode [ 2739.444329] device hsr_slave_0 left promiscuous mode [ 2739.449589] IPVS: set_ctl: invalid protocol: 60 224.0.0.2:0 [ 2739.494917] team0 (unregistering): Port device team_slave_1 removed [ 2739.520827] team0 (unregistering): Port device team_slave_0 removed [ 2739.538707] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2739.585485] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2739.677108] bond0 (unregistering): Released all slaves [ 2741.361108] IPVS: ftp: loaded support on port[0] = 21 [ 2742.199246] chnl_net:caif_netlink_parms(): no params data found [ 2742.236113] bridge0: port 1(bridge_slave_0) entered blocking state [ 2742.242936] bridge0: port 1(bridge_slave_0) entered disabled state [ 2742.249959] device bridge_slave_0 entered promiscuous mode [ 2742.256980] bridge0: port 2(bridge_slave_1) entered blocking state [ 2742.263605] bridge0: port 2(bridge_slave_1) entered disabled state [ 2742.271106] device bridge_slave_1 entered promiscuous mode [ 2742.287129] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 2742.296479] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 2742.316136] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 2742.324128] team0: Port device team_slave_0 added [ 2742.329675] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 2742.337056] team0: Port device team_slave_1 added [ 2742.342562] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 2742.349982] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 2742.412480] device hsr_slave_0 entered promiscuous mode [ 2742.450591] device hsr_slave_1 entered promiscuous mode [ 2742.490924] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 2742.498693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 2742.512823] bridge0: port 2(bridge_slave_1) entered blocking state [ 2742.519443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2742.526262] bridge0: port 1(bridge_slave_0) entered blocking state [ 2742.532881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2742.562823] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 2742.568922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2742.578575] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 2742.588003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2742.596049] bridge0: port 1(bridge_slave_0) entered disabled state [ 2742.603486] bridge0: port 2(bridge_slave_1) entered disabled state [ 2742.614572] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 2742.621469] 8021q: adding VLAN 0 to HW filter on device team0 [ 2742.631507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2742.639226] bridge0: port 1(bridge_slave_0) entered blocking state [ 2742.645627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2742.660927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2742.668655] bridge0: port 2(bridge_slave_1) entered blocking state [ 2742.675055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2742.685982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2742.694286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2742.704062] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2742.720441] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2742.730900] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2742.741842] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 2742.748522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2742.756281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2742.764662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2742.781106] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 2742.788931] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2742.795636] net_ratelimit: 12 callbacks suppressed [ 2742.795641] protocol 88fb is buggy, dev hsr_slave_0 [ 2742.795685] protocol 88fb is buggy, dev hsr_slave_1 [ 2742.811397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2742.825606] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2742.860356] protocol 88fb is buggy, dev hsr_slave_0 [ 2742.865568] protocol 88fb is buggy, dev hsr_slave_1 [ 2742.980266] protocol 88fb is buggy, dev hsr_slave_0 [ 2742.985440] protocol 88fb is buggy, dev hsr_slave_1 [ 2743.030303] protocol 88fb is buggy, dev hsr_slave_0 [ 2743.036225] protocol 88fb is buggy, dev hsr_slave_1 [ 2743.100310] protocol 88fb is buggy, dev hsr_slave_0 [ 2743.105507] protocol 88fb is buggy, dev hsr_slave_1 [ 2743.180743] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:26:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:29 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) 12:26:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r1) link(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='./file1\x00') 12:26:29 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:29 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 12:26:29 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x7e) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 12:26:29 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@nl=@unspec={0x1200000000000000, 0x0, 0x700000a, 0x80fe}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000280)="035db86376863a68fe800000000000004208c349d7c40346d59be131ad18d92c2bca9d7f6e6a6ac7d6", 0x29}], 0x1}, 0x0) 12:26:29 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:26:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4081, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) lseek(r1, 0x0, 0x0) r2 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) munlock(&(0x7f00000c6000/0x4000)=nil, 0x4000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) accept4$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x0, 0x101400) lsetxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000700)='securiuy.SMACK64\x00\x12\xa3\x91\xf3\x10?F\x92\x1dX\x06R\xdc\x91\xe3\xc5\xf0$\xa6Q\x03B\xf5Z\xfc\xc5\x1az\xee\xa91i\x1b\xc1\xa9\x9e\x1b\xc3e\xf8\'^\xd6P\xba\xbe\xe5I\x96s\x03\xa9\x00\x9dCU#\xc9\xbc\xb0\xac\x11\xb4y\x85co,t\xbcR`\x12\x12%\x0f[\xbe\x12\x9a\xcaV\xdeS\xd7\x15\'\xec\x06\xf7\x98{\xdem\x1fY\x95\xd3:\xbd\x82\xbb\x9a\\\b_(\x1dB\x1a\xbd\xfe\xe4\xb9\x84I0\xe4!d\x8d\x02\x9aHb\xec\xc0\xdd\x88\xf9\xcf\xaf\xac\xc7\x12\x00-\x9b\xc4{1^\xe56\xae\x92\xd9E\x8f\xa3\xbd\xcc\x10\x88\xab\x03\xf0\x96\xbc\xb46\x84;X\xda\x01\x8d\xd9s\x80\xa4\x9f\x176\x94\xf4x\x8f2\x1b&\xa1w\x93\xfa\x19\xdf\x90\xb3S]\xc7Z\xd0{\x97G\xa0\x8c\xef\x81\xd26\xfb^\xc6q\xc8\xa8\aM\x1fb@\x03\xb5\xd6', 0x0, 0x0, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46000) lseek(0xffffffffffffffff, 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='\rOq'], 0x3) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000000), 0x4) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="000227bd7000fddbdf250100000000000000024100000017001369623a00e390a7222ea0aa49276865647e38b4cc08f3cb0df814cbf012f3c6510768951458"], 0x3}, 0x1, 0x0, 0x0, 0x8820}, 0x1) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() 12:26:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f0000000440)="e046385738d0b6e2f17050c3002a9fe3e2f4bbc226e39bf35204d275a8fadde37aab3905bbacaf04d57fb246d660ea69d755b5fa4e9dcdda9919e7cfdd2fd6", 0x3f, 0x1, 0x0, 0x0) 12:26:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) recvmmsg(r0, &(0x7f0000007000)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/26, 0x1a}, {&(0x7f00000002c0)=""/222, 0xde}, {&(0x7f00000001c0)=""/143, 0x8f}], 0x3}}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000006c0)=""/210, 0xd2}, {&(0x7f0000000880)=""/238, 0xee}, {&(0x7f0000000a80)=""/220, 0xdc}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="32268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 12:26:30 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r3, 0x0) 12:26:30 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, 0x0, 0x0) 12:26:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:30 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, 0xffffffffffffffff, 0x0) [ 2745.100607] device bridge_slave_1 left promiscuous mode [ 2745.106364] bridge0: port 2(bridge_slave_1) entered disabled state [ 2745.171357] device bridge_slave_0 left promiscuous mode [ 2745.177184] bridge0: port 1(bridge_slave_0) entered disabled state [ 2745.527359] device hsr_slave_1 left promiscuous mode [ 2745.568340] device hsr_slave_0 left promiscuous mode [ 2745.624506] team0 (unregistering): Port device team_slave_1 removed [ 2745.661657] team0 (unregistering): Port device team_slave_0 removed [ 2745.681082] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 2745.733321] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 2745.897107] bond0 (unregistering): Released all slaves 12:26:31 executing program 1: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x6}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r2 = dup2(r1, r1) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r2, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180)=""/99, &(0x7f0000000080)=0x63) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, 0xffffffffffffffff, 0x0) 12:26:31 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x88}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 12:26:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbb24fec2fba09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:26:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xbd1e) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x4}, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)=0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) socket$inet6(0xa, 0x1, 0x0) 12:26:31 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x7}, 0x20) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000240), 0x26e) sendmsg$kcm(r0, 0x0, 0x0) [ 2747.761144] IPVS: ftp: loaded support on port[0] = 21 [ 2748.160277] net_ratelimit: 20 callbacks suppressed [ 2748.160282] protocol 88fb is buggy, dev hsr_slave_0 [ 2748.170426] protocol 88fb is buggy, dev hsr_slave_1