[ 10.462348] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.988570] random: sshd: uninitialized urandom read (32 bytes read) [ 27.372119] audit: type=1400 audit(1538451457.804:6): avc: denied { map } for pid=1765 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 27.419086] random: sshd: uninitialized urandom read (32 bytes read) [ 27.896727] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. [ 33.363356] random: sshd: uninitialized urandom read (32 bytes read) 2018/10/02 03:37:43 fuzzer started [ 33.450573] audit: type=1400 audit(1538451463.884:7): avc: denied { map } for pid=1780 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 34.606037] random: cc1: uninitialized urandom read (8 bytes read) 2018/10/02 03:37:46 dialing manager at 10.128.0.26:42743 2018/10/02 03:37:48 syscalls: 1 2018/10/02 03:37:48 code coverage: enabled 2018/10/02 03:37:48 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2018/10/02 03:37:48 setuid sandbox: enabled 2018/10/02 03:37:48 namespace sandbox: enabled 2018/10/02 03:37:48 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/02 03:37:48 fault injection: CONFIG_FAULT_INJECTION is not enabled 2018/10/02 03:37:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/02 03:37:48 net packed injection: enabled 2018/10/02 03:37:48 net device setup: enabled [ 38.782317] random: crng init done 03:38:18 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x4, 0xfffffffffffffe00, 0x5, 0xfffffffffffffffa}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000280)="0cd76519f6500fc30c5718bf500581263b89984138b241bc183933bebe9c2481d36545fa579999c1c0b4817a19a827fe2e49adf48a3c41291bea34329337954c1e7bb12db2a22c6a716702b404c3", &(0x7f0000000380)=""/179}, 0x18) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x0, 0x9698, 0x0, 0x0, 0x80000001}) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f0000000200)=0x54) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x70bd29}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x720000}) splice(r2, 0x0, r1, 0x0, 0xab11, 0x0) 03:38:18 executing program 5: r0 = socket(0x1000000000000011, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0), 0x0) 03:38:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0xdc08) sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x80) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28000080}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneightbl={0x14, 0x42, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20000004) 03:38:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x0, 0x0, &(0x7f0000001ac0)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0), 0x1f3) 03:38:18 executing program 3: capset(&(0x7f0000f0fffa)={0x14019980330}, &(0x7f00008e7000)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_pauseparam}) 03:38:18 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) futex(&(0x7f000000cffc)=0x2000000000004, 0x80000000000b, 0x4, &(0x7f0000564000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000), &(0x7f0000048000), 0x0) r1 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f00002cb000)={0x0, r1}) recvmsg(r3, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r0, r3) tkill(r1, 0x16) [ 68.307150] audit: type=1400 audit(1538451498.734:8): avc: denied { map } for pid=1780 comm="syz-fuzzer" path="/root/syzkaller-shm652576945" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 68.380103] audit: type=1400 audit(1538451498.764:9): avc: denied { map } for pid=1812 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 03:38:28 executing program 5: r0 = socket(0x1000000000000011, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0), 0x0) 03:38:28 executing program 5: r0 = socket(0x1000000000000011, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0), 0x0) 03:38:28 executing program 5: r0 = socket(0x1000000000000011, 0x2, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0), 0x0) 03:38:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="0501c35502000000660100000000000800000000010000000000000006000000002000000020000000010000000000006e5fbe719cd526ff53efefa6234eaf2a1496edb657aa369c4f2bfb41343929e19ca0bd84fc20e8774b0ab4387911f8a45b0df5f3395f", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 78.557744] EXT4-fs warning (device loop5): ext4_fill_super:3509: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 78.570494] EXT4-fs (loop5): VFS: Found ext4 filesystem with unknown checksum algorithm. 03:38:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="0501c35502000000660100000000000800000000010000000000000006000000002000000020000000010000000000006e5fbe719cd526ff53efefa6234eaf2a1496edb657aa369c4f2bfb41343929e19ca0bd84fc20e8774b0ab4387911f8a45b0df5f3395f", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 78.634283] EXT4-fs warning (device loop5): ext4_fill_super:3509: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 78.672319] EXT4-fs (loop5): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 78.801832] EXT4-fs warning (device loop5): ext4_fill_super:3509: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 78.815189] EXT4-fs (loop5): VFS: Found ext4 filesystem with unknown checksum algorithm. 03:38:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="0501c35502000000660100000000000800000000010000000000000006000000002000000020000000010000000000006e5fbe719cd526ff53efefa6234eaf2a1496edb657aa369c4f2bfb41343929e19ca0bd84fc20e8774b0ab4387911f8a45b0df5f3395f", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 78.912573] EXT4-fs warning (device loop5): ext4_fill_super:3509: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 78.934043] EXT4-fs (loop5): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 79.319417] capability: warning: `syz-executor3' uses 32-bit capabilities (legacy support in use) [ 80.160030] hrtimer: interrupt took 30433 ns 03:38:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000001c0)="0501c35502000000660100000000000800000000010000000000000006000000002000000020000000010000000000006e5fbe719cd526ff53efefa6234eaf2a1496edb657aa369c4f2bfb41343929e19ca0bd84fc20e8774b0ab4387911f8a45b0df5f3395f", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) 03:38:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x1, 0xff2d) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x0, 0x1}, 0x20) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:38:30 executing program 3: capset(&(0x7f0000f0fffa)={0x14019980330}, &(0x7f00008e7000)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_pauseparam}) 03:38:30 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x4, 0xfffffffffffffe00, 0x5, 0xfffffffffffffffa}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000280)="0cd76519f6500fc30c5718bf500581263b89984138b241bc183933bebe9c2481d36545fa579999c1c0b4817a19a827fe2e49adf48a3c41291bea34329337954c1e7bb12db2a22c6a716702b404c3", &(0x7f0000000380)=""/179}, 0x18) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x0, 0x9698, 0x0, 0x0, 0x80000001}) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f0000000200)=0x54) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x70bd29}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x720000}) splice(r2, 0x0, r1, 0x0, 0xab11, 0x0) 03:38:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x0, 0x0, &(0x7f0000001ac0)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0), 0x1f3) [ 80.578054] EXT4-fs warning (device loop5): ext4_fill_super:3509: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 80.618663] EXT4-fs (loop5): VFS: Found ext4 filesystem with unknown checksum algorithm. 03:38:31 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) futex(&(0x7f000000cffc)=0x2000000000004, 0x80000000000b, 0x4, &(0x7f0000564000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000), &(0x7f0000048000), 0x0) r1 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f00002cb000)={0x0, r1}) recvmsg(r3, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r0, r3) tkill(r1, 0x16) 03:38:31 executing program 3: capset(&(0x7f0000f0fffa)={0x14019980330}, &(0x7f00008e7000)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_pauseparam}) 03:38:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:31 executing program 3: capset(&(0x7f0000f0fffa)={0x14019980330}, &(0x7f00008e7000)) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_pauseparam}) [ 80.868697] audit: type=1400 audit(1538451511.294:10): avc: denied { map_create } for pid=4566 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) [ 80.939702] audit: type=1400 audit(1538451511.324:11): avc: denied { map_read map_write } for pid=4566 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:38:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x1, 0xff2d) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x0, 0x1}, 0x20) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:38:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x4, 0xfffffffffffffe00, 0x5, 0xfffffffffffffffa}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000280)="0cd76519f6500fc30c5718bf500581263b89984138b241bc183933bebe9c2481d36545fa579999c1c0b4817a19a827fe2e49adf48a3c41291bea34329337954c1e7bb12db2a22c6a716702b404c3", &(0x7f0000000380)=""/179}, 0x18) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x0, 0x9698, 0x0, 0x0, 0x80000001}) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f0000000200)=0x54) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x70bd29}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x720000}) splice(r2, 0x0, r1, 0x0, 0xab11, 0x0) 03:38:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:32 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) futex(&(0x7f000000cffc)=0x2000000000004, 0x80000000000b, 0x4, &(0x7f0000564000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000), &(0x7f0000048000), 0x0) r1 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f00002cb000)={0x0, r1}) recvmsg(r3, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r0, r3) tkill(r1, 0x16) 03:38:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x0, 0x0, &(0x7f0000001ac0)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0), 0x1f3) 03:38:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x1, 0xff2d) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x0, 0x1}, 0x20) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:38:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, 0xfffffffffffffffe, 0x0) 03:38:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, 0xfffffffffffffffe, 0x0) 03:38:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0xe, 0x4, 0x4, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000e000)={r0, &(0x7f0000000000), &(0x7f000000c000)="02"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/104}, 0x18) 03:38:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, 0xfffffffffffffffe, 0x0) 03:38:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x100000001, 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:38:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000080)={0x4, 0xfffffffffffffe00, 0x5, 0xfffffffffffffffa}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000280)="0cd76519f6500fc30c5718bf500581263b89984138b241bc183933bebe9c2481d36545fa579999c1c0b4817a19a827fe2e49adf48a3c41291bea34329337954c1e7bb12db2a22c6a716702b404c3", &(0x7f0000000380)=""/179}, 0x18) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000000100), 0xfffffffffffffffa, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/member\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000100)={0x0, 0x9698, 0x0, 0x0, 0x80000001}) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'raw\x00'}, &(0x7f0000000200)=0x54) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000100)) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000900)=ANY=[@ANYBLOB], 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000100), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x70bd29}, 0x14}}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x802c550a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x720000}) splice(r2, 0x0, r1, 0x0, 0xab11, 0x0) 03:38:32 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, 0xfffffffffffffffe, 0x0) 03:38:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x100000001, 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:38:32 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff}) futex(&(0x7f000000cffc)=0x2000000000004, 0x80000000000b, 0x4, &(0x7f0000564000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000), &(0x7f0000048000), 0x0) r1 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000008ff8)=0x7) fcntl$setsig(r2, 0xa, 0x12) fcntl$setownex(r2, 0xf, &(0x7f00002cb000)={0x0, r1}) recvmsg(r3, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) dup2(r0, r3) tkill(r1, 0x16) 03:38:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x1, 0xff2d) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@empty, 0x0, 0x1}, 0x20) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000140), 0x4) 03:38:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x100000001, 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:38:32 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x0, 0x0, &(0x7f0000001ac0)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0), 0x1f3) 03:38:32 executing program 3: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x100000001, 0x1) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:38:33 executing program 3: memfd_create(&(0x7f0000000100)="00966619225a8a010f0a5ac716a55c5a3a28de8e7e963638a8f3ad22636c9ff2d42ecbb27eb716bb553402a751a3fc80b166c09a485edb56ac6c6fc5975be0585fff36be049def871f92303cdabe800269b8c147", 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 03:38:33 executing program 3: memfd_create(&(0x7f0000000100)="00966619225a8a010f0a5ac716a55c5a3a28de8e7e963638a8f3ad22636c9ff2d42ecbb27eb716bb553402a751a3fc80b166c09a485edb56ac6c6fc5975be0585fff36be049def871f92303cdabe800269b8c147", 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 03:38:33 executing program 3: memfd_create(&(0x7f0000000100)="00966619225a8a010f0a5ac716a55c5a3a28de8e7e963638a8f3ad22636c9ff2d42ecbb27eb716bb553402a751a3fc80b166c09a485edb56ac6c6fc5975be0585fff36be049def871f92303cdabe800269b8c147", 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 03:38:33 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:33 executing program 3: memfd_create(&(0x7f0000000100)="00966619225a8a010f0a5ac716a55c5a3a28de8e7e963638a8f3ad22636c9ff2d42ecbb27eb716bb553402a751a3fc80b166c09a485edb56ac6c6fc5975be0585fff36be049def871f92303cdabe800269b8c147", 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00', 0x0, 0x0, 0x400}, 0x2c) 03:38:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0x77359400}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x32fffffe) 03:38:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0x77359400}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x32fffffe) 03:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000980)=@rc, 0x80, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)}}], 0x2, 0x24000884) 03:38:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002900)}}], 0x3ffffffffffff2b, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:apt_exec_t:s0\x00', 0x20, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x20) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000240)=0x40) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) r3 = syz_open_procfs(r2, &(0x7f0000000440)='net/anycast6\x00') preadv(r3, &(0x7f00000017c0), 0x1d0, 0x0) ptrace$peek(0x2, 0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) 03:38:33 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000980)=@rc, 0x80, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)}}], 0x2, 0x24000884) 03:38:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0x77359400}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x32fffffe) 03:38:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000980)=@rc, 0x80, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)}}], 0x2, 0x24000884) 03:38:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f00006f7000)={0x77359400}, &(0x7f0000000000), 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x32fffffe) 03:38:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000980)=@rc, 0x80, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)}}], 0x2, 0x24000884) 03:38:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:34 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, &(0x7f0000004640)={0x0, 0x989680}) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r2) writev(r2, &(0x7f00000023c0), 0x1000000000000252) fchdir(0xffffffffffffffff) 03:38:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:34 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:35 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:35 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:35 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:36 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:36 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x3, 0x8000, 0x0) fallocate(r1, 0x3, 0x0, 0xfff9) unshare(0x40000000) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000003c0)={{0x2, 0x4e20, @rand_addr}, {0x306, @local}, 0x0, {0x2, 0x4e24, @remote}, 'nr0\x00'}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x82481, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000006c0)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000940)={'broute\x00', 0x0, 0x4, 0xdb, [], 0x4, &(0x7f0000000800)=[{}, {}, {}, {}], &(0x7f0000000840)=""/219}, &(0x7f00000009c0)=0x78) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1a) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f00000001c0)={0x5bcc46c6d224a2ab, 0x2, 0x0, {}, {0x5, 0x8}, @rumble={0x0, 0x8}}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x7, 0x1f}) 03:38:37 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:37 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:37 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:37 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x58, 0x0, &(0x7f0000000140)=[@dead_binder_done, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)}}, @decrefs], 0x1, 0x0, &(0x7f0000000200)="12"}) 03:38:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000000), 0xc, &(0x7f00000006c0)={&(0x7f0000000240)=@newsa={0x13c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0) [ 86.992788] binder: 4860:4861 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 87.016598] binder: 4860:4861 transaction failed 29189/-22, size 0-0 line 3012 [ 87.039143] binder: 4860:4864 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 87.060225] binder: 4860:4864 transaction failed 29189/-22, size 0-0 line 3012 03:38:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000000), 0xc, &(0x7f00000006c0)={&(0x7f0000000240)=@newsa={0x13c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0) 03:38:37 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x58, 0x0, &(0x7f0000000140)=[@dead_binder_done, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)}}, @decrefs], 0x1, 0x0, &(0x7f0000000200)="12"}) 03:38:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000000), 0xc, &(0x7f00000006c0)={&(0x7f0000000240)=@newsa={0x13c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0) [ 87.154502] binder: 4873:4877 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 87.174537] binder: 4873:4877 transaction failed 29189/-22, size 0-0 line 3012 03:38:37 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x58, 0x0, &(0x7f0000000140)=[@dead_binder_done, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)}}, @decrefs], 0x1, 0x0, &(0x7f0000000200)="12"}) 03:38:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x4) 03:38:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000000), 0xc, &(0x7f00000006c0)={&(0x7f0000000240)=@newsa={0x13c, 0x10, 0x721, 0x0, 0x0, {{@in=@rand_addr, @in6=@dev}, {@in=@broadcast, 0x0, 0x833}, @in6, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0) 03:38:37 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x4) [ 87.279547] binder: 4885:4889 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 87.294894] tmpfs: No value for mount option './file0' [ 87.303286] binder: 4885:4889 transaction failed 29189/-22, size 0-0 line 3012 03:38:38 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:38 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:38 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x58, 0x0, &(0x7f0000000140)=[@dead_binder_done, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)}}, @decrefs], 0x1, 0x0, &(0x7f0000000200)="12"}) 03:38:38 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:38 executing program 1: creat(&(0x7f0000000400)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 03:38:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x4) 03:38:38 executing program 1: creat(&(0x7f0000000400)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) 03:38:38 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000001540)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001000)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9b4b62b}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x4) [ 87.813946] binder: 4911:4917 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 87.819405] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 03:38:38 executing program 1: creat(&(0x7f0000000400)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 87.877207] binder: 4911:4917 transaction failed 29189/-22, size 0-0 line 3012 [ 87.898894] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 03:38:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) dup3(r1, r0, 0x0) 03:38:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 03:38:38 executing program 1: creat(&(0x7f0000000400)='./file1\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)={[], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) [ 87.992086] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 [ 88.063145] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev bpf, type bpf) errno=-22 03:38:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 03:38:39 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) dup3(r1, r0, 0x0) 03:38:39 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000d8d000)={0x77359400}, &(0x7f0000048000), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/prev\x00') r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) 03:38:39 executing program 1: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:39 executing program 5: clock_gettime(0x2, &(0x7f0000000100)) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000490000004cd4e7598e569330bcd0aa83663bbc4a0b26920c0000000024fe7a9cc522aa0bf70053bec210678dd730d8fbd5a12750c54c3d6c84b6c071279bb07e4004a55db512caae5c536bf8699bcc03821e9bbb0fbd59f123cac17149d10af301a99bdc5bf2f04e83e7bf07c5d0f23584008c7b23a9b541d04c2a0940caf45c5a1d76d05f6ebe38aadf92ac7e2080a821c84151d1f410f883b7d09194110fe10645d07067946d74f0972d5ced82322294832548861fe0b9e215c6cd0dd1c0e305d29081e14dccf906ad92d4d15d917d1e839c3a885278bfc5590fa8f3669090e1a46bbe9f777abe1a926aee984c5bb7a94e62247a7f767e3faf8540e2d9ef5af7ca0bd17be750423925c7813dd2341c121d3164ffeee5c2b40a2ebbb0ab3a66624d992ca152c1c94c2d9a3a0000000000000000000000596a8ecb49a79ce8c26f09833caaab369cb6399b8adb46a40ea13d4370e6f97d198525351cc34efdd9df60bbd69e9fb706a69b0102acd8034804b87c4da141e8e9ef22521940d0b25089aa6b4da0bcbac24528fe54307bee26e599b0890d2f969c45b8d6e28f7358c0c5c8e53250ae14c7a6142b1b4f8a666c6273c260cb00a2daf69050cbcd3b39ba08cfe5994e56f80d81d05011ee4b451d48e70b955715f78995db"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r2, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000680)='uid_map\x00') r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) 03:38:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 03:38:39 executing program 4: r0 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 03:38:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) dup3(r1, r0, 0x0) 03:38:39 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}, &(0x7f0000000140)) 03:38:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) dup3(r1, r0, 0x0) 03:38:39 executing program 1: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:39 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}, &(0x7f0000000140)) 03:38:39 executing program 1: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:39 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}, &(0x7f0000000140)) 03:38:39 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}, &(0x7f0000000140)) 03:38:39 executing program 5: clock_gettime(0x2, &(0x7f0000000100)) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r2, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000680)='uid_map\x00') r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) 03:38:39 executing program 0: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:39 executing program 3: clock_gettime(0x2, &(0x7f0000000100)) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r2, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000680)='uid_map\x00') r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) 03:38:39 executing program 2: clock_gettime(0x2, &(0x7f0000000100)) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r2, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000680)='uid_map\x00') r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) 03:38:39 executing program 0: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:40 executing program 1: socketpair$unix(0x1, 0x800000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) request_key(&(0x7f0000000640)='syzkaller\x00', &(0x7f0000000680), &(0x7f00000006c0)='\x00', 0xfffffffffffffff9) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 03:38:40 executing program 4: clock_gettime(0x2, &(0x7f0000000100)) r0 = inotify_init() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) ioctl$VT_WAITACTIVE(r0, 0x5607) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=0x1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) flistxattr(r2, &(0x7f00000008c0)=""/249, 0xf9) keyctl$setperm(0x5, 0x0, 0x3) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e24, @multicast2}, {0x0, @random="59a310eebccc"}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_bond\x00'}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001000), 0xc5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000640)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000680)='uid_map\x00') r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r7 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x1) sendfile(r6, r6, &(0x7f0000000000), 0x2000005) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r6, 0x4c01) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) [ 89.656352] bdi-block not registered [ 89.662277] ------------[ cut here ]------------ [ 89.667149] WARNING: CPU: 0 PID: 5009 at fs/fs-writeback.c:2162 __mark_inode_dirty.cold.12+0x15/0x2a [ 89.676518] Kernel panic - not syncing: panic_on_warn set ... [ 89.676518] [ 89.685377] CPU: 0 PID: 5009 Comm: syz-executor5 Not tainted 4.14.73+ #13 [ 89.692309] Call Trace: [ 89.695053] dump_stack+0xb9/0x11b [ 89.698739] ? block_dump___mark_inode_dirty.cold.11+0xaf/0x185 [ 89.704904] panic+0x1bf/0x3a4 [ 89.708118] ? add_taint.cold.4+0x16/0x16 [ 89.712476] ? __probe_kernel_read+0x163/0x1c0 [ 89.717088] ? __mark_inode_dirty.cold.12+0x15/0x2a [ 89.722472] __warn.cold.7+0x148/0x185 [ 89.726380] ? __mark_inode_dirty.cold.12+0x15/0x2a [ 89.731506] report_bug+0x1f7/0x26c [ 89.735192] do_error_trap+0x1ba/0x2c0 [ 89.739548] ? math_error+0x2d0/0x2d0 [ 89.743755] ? console_unlock+0x4d8/0xb50 [ 89.748118] ? vprintk_emit+0x104/0x150 [ 89.753660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.758535] invalid_op+0x18/0x40 [ 89.762005] RIP: 0010:__mark_inode_dirty.cold.12+0x15/0x2a [ 89.767658] RSP: 0018:ffff8801c5f37478 EFLAGS: 00010282 [ 89.773033] RAX: 0000000000000018 RBX: ffff8801d53ebb18 RCX: 0000000000013d11 [ 89.780317] RDX: 0000000000000000 RSI: ffffc90000923000 RDI: ffffffffae5d03a0 [ 89.787598] RBP: ffff8801a8efd500 R08: 0000000000000001 R09: 0000000000000000 [ 89.794912] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801a8efd558 [ 89.802295] R13: ffff8801d53ebbf0 R14: ffff8801a8efd5b0 R15: ffff8801a8efd500 [ 89.809643] ? __mark_inode_dirty.cold.12+0x15/0x2a [ 89.814687] mark_buffer_dirty+0x24f/0x480 [ 89.818946] __block_commit_write.isra.12+0x13d/0x210 [ 89.824153] block_write_end+0x42/0xf0 [ 89.828045] blkdev_write_end+0x3c/0x110 [ 89.832233] generic_perform_write+0x294/0x430 [ 89.836819] ? preempt_count_add+0x7d/0x130 [ 89.841560] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 89.846300] ? __mnt_drop_write+0x40/0x70 [ 89.850465] ? file_update_time+0xbc/0x390 [ 89.857539] ? current_time+0xb0/0xb0 [ 89.861691] ? _raw_spin_unlock_irqrestore+0x59/0x70 [ 89.866802] __generic_file_write_iter+0x345/0x540 [ 89.871822] blkdev_write_iter+0x1fa/0x3d0 [ 89.876075] ? check_disk_change+0x120/0x120 [ 89.880562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 89.885321] ? retint_kernel+0x2d/0x2d [ 89.889223] do_iter_readv_writev+0x3a4/0x560 [ 89.893817] ? clone_verify_area+0x1e0/0x1e0 [ 89.898240] ? __sanitizer_cov_trace_pc+0x58/0x60 [ 89.903303] ? security_file_permission+0x88/0x1e0 [ 89.908234] do_iter_write+0x156/0x530 [ 89.912126] ? direct_splice_actor+0x160/0x160 [ 89.917009] vfs_iter_write+0x70/0xa0 [ 89.921680] iter_file_splice_write+0x5b4/0xab0 [ 89.926353] ? vmsplice_to_user+0x1e0/0x1e0 [ 89.931554] ? vmsplice_to_user+0x1e0/0x1e0 [ 89.935966] direct_splice_actor+0x116/0x160 [ 89.940377] splice_direct_to_actor+0x28c/0x750 [ 89.945060] ? pipe_to_sendpage+0x300/0x300 [ 89.949394] ? do_splice_to+0x150/0x150 [ 89.953549] ? security_file_permission+0x88/0x1e0 [ 89.959653] do_splice_direct+0x17b/0x220 [ 89.963817] ? splice_direct_to_actor+0x750/0x750 [ 89.969304] do_sendfile+0x4a1/0xb50 [ 89.973043] ? do_compat_pwritev64+0x170/0x170 [ 89.977661] ? __might_fault+0xd4/0x1b0 [ 89.981982] ? __might_fault+0x177/0x1b0 [ 89.986189] SyS_sendfile64+0xab/0x140 [ 89.990095] ? SyS_sendfile+0x150/0x150 [ 89.994073] ? do_syscall_64+0x43/0x4b0 [ 89.998051] ? SyS_sendfile+0x150/0x150 [ 90.002035] do_syscall_64+0x19b/0x4b0 [ 90.006188] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.011639] RIP: 0033:0x457579 [ 90.014913] RSP: 002b:00007ff79b10fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 90.022987] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457579 [ 90.030340] RDX: 0000000020000000 RSI: 000000000000000b RDI: 000000000000000b [ 90.037904] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 90.045183] R10: 0000000002000005 R11: 0000000000000246 R12: 00007ff79b1106d4 [ 90.052451] R13: 00000000004c34e4 R14: 00000000004d5298 R15: 00000000ffffffff [ 90.063190] Kernel Offset: 0x29c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 90.074265] Rebooting in 86400 seconds..