[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.117709] random: sshd: uninitialized urandom read (32 bytes read) [ 36.413607] kauditd_printk_skb: 10 callbacks suppressed [ 36.413615] audit: type=1400 audit(1570113340.135:35): avc: denied { map } for pid=6985 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.469012] random: sshd: uninitialized urandom read (32 bytes read) [ 37.116496] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. [ 42.619541] random: sshd: uninitialized urandom read (32 bytes read) 2019/10/03 14:35:46 fuzzer started [ 42.807405] audit: type=1400 audit(1570113346.525:36): avc: denied { map } for pid=6995 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 43.707359] random: cc1: uninitialized urandom read (8 bytes read) 2019/10/03 14:35:48 dialing manager at 10.128.0.105:38761 2019/10/03 14:35:48 syscalls: 2500 2019/10/03 14:35:48 code coverage: enabled 2019/10/03 14:35:48 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/10/03 14:35:48 extra coverage: extra coverage is not supported by the kernel 2019/10/03 14:35:48 setuid sandbox: enabled 2019/10/03 14:35:48 namespace sandbox: enabled 2019/10/03 14:35:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/03 14:35:48 fault injection: enabled 2019/10/03 14:35:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/03 14:35:48 net packet injection: enabled 2019/10/03 14:35:48 net device setup: enabled [ 45.947693] random: crng init done 14:37:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 14:37:41 executing program 0: creat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x59, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'system.', '\x00'}) 14:37:42 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000040)={0xffff, 0x1, "02"}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 14:37:42 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) open(0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) pipe(&(0x7f0000000080)) 14:37:42 executing program 1: creat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x59, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', 0x0) 14:37:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) [ 158.245989] audit: type=1400 audit(1570113461.965:37): avc: denied { map } for pid=6995 comm="syz-fuzzer" path="/root/syzkaller-shm286957752" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 158.310309] audit: type=1400 audit(1570113461.975:38): avc: denied { map } for pid=7013 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13690 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 158.630929] IPVS: ftp: loaded support on port[0] = 21 [ 159.419681] chnl_net:caif_netlink_parms(): no params data found [ 159.431631] IPVS: ftp: loaded support on port[0] = 21 [ 159.460385] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.467248] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.474739] device bridge_slave_0 entered promiscuous mode [ 159.489448] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.496242] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.503478] device bridge_slave_1 entered promiscuous mode [ 159.527624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.536764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.557017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.564676] team0: Port device team_slave_0 added [ 159.570659] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.577815] team0: Port device team_slave_1 added [ 159.585305] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.593357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.601486] IPVS: ftp: loaded support on port[0] = 21 [ 159.663716] device hsr_slave_0 entered promiscuous mode [ 159.700402] device hsr_slave_1 entered promiscuous mode [ 159.782795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.806884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.846583] chnl_net:caif_netlink_parms(): no params data found [ 159.875152] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.881631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 159.888615] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.895022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.918657] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.926277] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.932281] IPVS: ftp: loaded support on port[0] = 21 [ 159.938498] device bridge_slave_0 entered promiscuous mode [ 159.945719] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.952382] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.959326] device bridge_slave_1 entered promiscuous mode [ 159.976948] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.986712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.014420] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 160.022236] team0: Port device team_slave_0 added [ 160.029144] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.036549] team0: Port device team_slave_1 added [ 160.051896] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.074850] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.143049] device hsr_slave_0 entered promiscuous mode [ 160.180368] device hsr_slave_1 entered promiscuous mode [ 160.260471] chnl_net:caif_netlink_parms(): no params data found [ 160.268700] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 160.284303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.312754] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.319181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.325987] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.332358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.363349] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.369809] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.376968] device bridge_slave_0 entered promiscuous mode [ 160.388821] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.395414] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.402462] device bridge_slave_1 entered promiscuous mode [ 160.445774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.453653] IPVS: ftp: loaded support on port[0] = 21 [ 160.460143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 160.498577] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 160.507342] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.514941] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.522776] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.529737] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.542979] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.553770] chnl_net:caif_netlink_parms(): no params data found [ 160.579652] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.588456] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.613065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.622220] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.629788] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 160.637435] team0: Port device team_slave_0 added [ 160.643111] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 160.651046] team0: Port device team_slave_1 added [ 160.658613] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 160.671327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.677437] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.685494] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.694455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 160.701727] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.708271] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.715508] device bridge_slave_0 entered promiscuous mode [ 160.722680] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.729158] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.736799] device bridge_slave_1 entered promiscuous mode [ 160.747224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.775309] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.784282] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.790680] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.797282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.805489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.813915] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.820307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.827413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.835136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.843804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.893264] device hsr_slave_0 entered promiscuous mode [ 160.940388] device hsr_slave_1 entered promiscuous mode [ 160.998716] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.007818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.016124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.024022] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.030560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.038942] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 161.046732] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 161.057225] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 161.065347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.078572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.088082] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 161.101557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 161.117366] IPVS: ftp: loaded support on port[0] = 21 [ 161.125667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.134341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.142309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.150604] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.156962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.168651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 161.178081] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 161.185688] team0: Port device team_slave_0 added [ 161.193975] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 161.202144] team0: Port device team_slave_1 added [ 161.207825] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 161.216764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.224448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.239019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 161.247177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 161.261428] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 161.269465] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.276759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.284751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.292533] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.298883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.305921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.314067] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.342566] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.353471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 161.366502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 161.411950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.419522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.431229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.443740] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 161.512643] device hsr_slave_0 entered promiscuous mode [ 161.550599] device hsr_slave_1 entered promiscuous mode [ 161.591557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 161.604242] chnl_net:caif_netlink_parms(): no params data found [ 161.624148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.631874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.641098] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.647282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.654644] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 161.666071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 161.681794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 161.691687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.705614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.713805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.738248] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 161.747419] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 161.759782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.767989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.776088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.823119] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.829725] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.837940] device bridge_slave_0 entered promiscuous mode [ 161.846287] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 161.856873] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 161.879461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 161.889110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.896010] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.903480] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.911213] device bridge_slave_1 entered promiscuous mode [ 161.924492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.932217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.941223] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 161.949559] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 161.960957] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 161.967319] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 161.981180] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 161.989723] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.004147] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.012036] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.019669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.027082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.039534] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.046771] chnl_net:caif_netlink_parms(): no params data found [ 162.074063] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.081055] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.088376] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.100639] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.130916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.167604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.189510] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.197404] team0: Port device team_slave_0 added [ 162.207354] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.216945] team0: Port device team_slave_1 added [ 162.222721] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.229214] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.237799] device bridge_slave_0 entered promiscuous mode [ 162.244757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.252813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.260752] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.267151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.276658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 14:37:46 executing program 0: r0 = memfd_create(&(0x7f00000005c0)='vmnet1eth0.bdevwlan0#\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="40000000000025000400000005007400000000000000200000"], 0x19) sendfile(r0, r0, &(0x7f0000001000), 0xffff) [ 162.289991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.298376] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.307550] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.327045] device bridge_slave_1 entered promiscuous mode [ 162.338893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.346750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.355358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.363566] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.369976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.379511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 162.391129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.413068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.426344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.442403] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 162.450331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:37:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x1000001, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) [ 162.486554] bond0: Enslaving bond_slave_0 as an active interface with an up link 14:37:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000010203000000000000000000000000000800070074000000"], 0x1c}}, 0x0) [ 162.532988] device hsr_slave_0 entered promiscuous mode 14:37:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 162.580456] device hsr_slave_1 entered promiscuous mode 14:37:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x2) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r2 = getpid() kcmp(r2, 0x0, 0x4, 0xffffffffffffffff, r0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x4, 0x0, 0x1, 0x2}) lseek(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f00000004c0)='./bus\x00', 0xa) r3 = creat(0x0, 0x80) write$P9_RLOCK(r3, &(0x7f0000000400)={0x8, 0x35, 0x1}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) [ 162.620872] audit: type=1400 audit(1570113466.345:39): avc: denied { create } for pid=7076 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 162.621301] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.679331] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.686363] audit: type=1400 audit(1570113466.375:40): avc: denied { write } for pid=7076 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 162.715715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 162.724698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.734200] audit: type=1400 audit(1570113466.445:41): avc: denied { create } for pid=7080 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 [ 162.758527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.766967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:37:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 162.774748] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.792221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.815142] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 14:37:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 162.828863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 14:37:46 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001540)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) [ 162.879751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.894829] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.914419] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.929365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.942707] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.948938] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.959787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 162.967424] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.976603] team0: Port device team_slave_0 added [ 162.984618] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.991966] team0: Port device team_slave_1 added [ 162.997160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.005061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.015109] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.025393] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.036838] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.044786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.054074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.064154] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.070706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.077690] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.087179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.097306] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 163.106685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.116163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.123986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.131729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.139754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.147882] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.154290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.163842] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.169968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.196313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.213042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.223645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.263682] device hsr_slave_0 entered promiscuous mode [ 163.302032] device hsr_slave_1 entered promiscuous mode [ 163.341843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.349857] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 163.357528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 163.375830] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.385801] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.394107] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.404684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.412534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.420586] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.429162] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.438599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.447050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.456249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.469984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.479334] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.489213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.497105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.508868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.519621] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.534796] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.541872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.548740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.556816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.565798] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.576109] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 163.587606] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.597883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.605619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.614203] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 163.620768] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.630912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.638072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.646411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.654936] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.661391] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.668579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.680457] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.689647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 163.698866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.708438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.716554] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.722945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.736829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.745934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.767278] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.775222] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.789533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.798458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.806224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.814368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.822547] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.834764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.843012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.849713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.857467] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.867154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.877423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.885775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.902963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.914588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 163.923723] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.934643] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.941014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.954883] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.962703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.974590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.983297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.990561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.999620] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.007622] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.017387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.031372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.045164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.059801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.067910] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.074351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.082122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.091080] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.099178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.107934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.124348] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.130888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.145380] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.154159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.169561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 164.179421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.188877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 164.196164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.204090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.212581] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.222582] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 164.229592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.237814] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.248737] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 164.257280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.264920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.275454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 164.282863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.290905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.300806] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 14:37:48 executing program 3: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x6, &(0x7f0000002340), 0x20002344) 14:37:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:37:48 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x1046, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fcntl$notify(r2, 0x402, 0x39) getdents64(r2, 0x0, 0x0) [ 164.306888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.326779] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 164.341508] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.412734] EXT4-fs (sda1): re-mounted. Opts: 14:37:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd026186f88aff9a4ea5978b9d97504800fd6d5e557c6f1457654c51e5454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49716a34e4ad41884d87df4cab91216f1cde8eb32ca4346fa9b22060d2cf09b2855564fe77cf8b7bcec7063fcfdcbb2ad1f39277e4b51caa37836ed5cb3851cbcf63427787314bd4886805864dc850bc97b19e0577299f30c2004da06409d4ef85bdd67e026aca084f6798248cf0dc8ea28e74fc567c054b2a9016d411b1df6ce2a889e0eaef07e200de907944a63e56de457630a66752106901164bfa1c6eea38762829f689b4b238f993737cd3be5c949504e70c6165af415851cc43955a662af8f0cad2e11d708feda172b40a9ca5863ec15c756877b4fe602a8a604930f1146497344ac661889a4f8cb7087a7ab85b05559396ca13b919fbf47b55c89499508009474788408ea12668b8e28da6ff5fd0e1b163e8750bd2d2f82cbbfa874b349533a583f19d0305c541f031eed18b47ddc61e0b97ee67f79ca71d3fa063483ab27f2c2ba185be30ebaef65495e32d0ee1aa3caeba0af7be8d3a4f14df6762227b02bbc2c1427e46358fbf77e9aa7c66fc431b864c50e522a0b24ffd72ec1e83d9484036792658fa67dbdeb003d2d6769ee366189a1fa7afd9b348ceebfd3ae0c21957547c7dc8b6ba34cba22b0805373b3326f31de1b02bb36dfb53df3036354f31fed01868f61a855e4d7e17c7f799f8ba88884be595dfcd24a204770dc19788a7fc7211d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088471fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:37:49 executing program 1: socket$kcm(0x29, 0x5, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088471fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000020c0)='memory.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:37:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088471fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 14:37:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000140)={{0x0, 0xc004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, {}, {}, {}, {}, {}, {}, {}, {}, {0x6000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000, [0x0, 0x0, 0x0, 0xfffffffffffffbff]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000280)) 14:37:49 executing program 0: r0 = socket$kcm(0x10, 0x40000000002, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='\x8fv\x8auts\x00\xc4\x91n\xdaK\xcb\x05\xbf\x10\x1f\x10\xcb\tl\xaeD\xb5\xe8\\|\x9a\x8dS\xe3\n\x19\xa5dg\xf2\xde\x8b\x15\xa2\xe2\x97\x81\xd4K\\\xff\xb6\xb7\xef8\xd6X\xb7\x89\xdb\xe3Ru0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x44400) ftruncate(r2, 0xa200) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x4003ff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:37:52 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f00000002c0)='./file0\x00', 0x0) 14:37:52 executing program 3: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x7, 0xc9bb5c4d2fc2ba79) write$P9_RGETATTR(r1, &(0x7f0000000b40)={0xa0, 0x19, 0x2, {0x400, {0x1, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x4a, 0x0, 0x24b0839a, 0x7, 0x1, 0x7f, 0x5, 0x8, 0x6, 0x6, 0x401, 0xe2, 0x8, 0xffffffff, 0x6}}, 0xa0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000002300470800000078000000000004000000"], 0x1}}, 0x8802) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x9d, 0x101000) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x10800, &(0x7f0000000540)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0xffffffff}}, {@sq={'sq', 0x3d, 0x6}}, {@rq={'rq', 0x3d, 0x8f10}}, {@common=@privport='privport'}, {@rq={'rq', 0x3d, 0x2}}], [{@pcr={'pcr', 0x3d, 0x27}}]}}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8eb08ed1b97c454b}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x1c, 0x18, {0x8123, @bearer=@l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x26044005) rmdir(0x0) socket(0x0, 0x1, 0x5) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r3 = socket$inet6(0xa, 0x803, 0x3) getrandom(&(0x7f0000000200)=""/21, 0x15, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 14:37:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)={[{@dmode={'dmode'}}]}) 14:37:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 168.973173] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.982155] bridge0: port 1(bridge_slave_0) entered disabled state 14:37:52 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) stat(&(0x7f00000002c0)='./file0\x00', 0x0) 14:37:52 executing program 3: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x7, 0xc9bb5c4d2fc2ba79) write$P9_RGETATTR(r1, &(0x7f0000000b40)={0xa0, 0x19, 0x2, {0x400, {0x1, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x4a, 0x0, 0x24b0839a, 0x7, 0x1, 0x7f, 0x5, 0x8, 0x6, 0x6, 0x401, 0xe2, 0x8, 0xffffffff, 0x6}}, 0xa0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000002300470800000078000000000004000000"], 0x1}}, 0x8802) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x9d, 0x101000) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x10800, &(0x7f0000000540)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0xffffffff}}, {@sq={'sq', 0x3d, 0x6}}, {@rq={'rq', 0x3d, 0x8f10}}, {@common=@privport='privport'}, {@rq={'rq', 0x3d, 0x2}}], [{@pcr={'pcr', 0x3d, 0x27}}]}}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8eb08ed1b97c454b}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, 0x0, 0x0, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x1c, 0x18, {0x8123, @bearer=@l2={'eth', 0x3a, 'bond_slave_1\x00'}}}}}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x26044005) rmdir(0x0) socket(0x0, 0x1, 0x5) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r3 = socket$inet6(0xa, 0x803, 0x3) getrandom(&(0x7f0000000200)=""/21, 0x15, 0x5) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 14:37:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1e, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:37:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 14:37:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 14:37:52 executing program 1: mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc088477, 0x0, 0x0) 14:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 169.220814] ISOFS: Unable to identify CD-ROM format. 14:37:53 executing program 4: clone(0x20000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$alg(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x274, &(0x7f0000000080)=[{0x300}]}) [ 169.325835] audit: type=1800 audit(1570113473.045:44): pid=7492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16613 res=0 14:37:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000280)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:37:53 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x800412f9, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) 14:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 169.435955] audit: type=1804 audit(1570113473.065:45): pid=7492 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir353326819/syzkaller.TLx77N/32/file0" dev="sda1" ino=16613 res=1 14:37:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:37:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x40, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)=0x7) getrandom(&(0x7f0000000300)=""/212, 0xfffffffffffffe4b, 0x2) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="cffd4bc8c9110899d5ef06370419bdbeefd22c9c7b1dafd0605f4315f77894db9c67b7857416405b09c158d614c10f2837cd8f053ed2e05c9b85aa21ea370e38f6dcdb29c7c6d90fe66633bae157843e45a95afdedd6a78397c782ad54d072c5b0fc0ddbb822248801a70df41535b037860000003a"], 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000280)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x90000, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x14, 0x0, &(0x7f0000000040)=0x1) ioctl$SCSI_IOCTL_GET_IDLUN(r5, 0x5382, &(0x7f0000000140)) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION(r7, 0xae03, 0x1000) syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/ipc\x00') ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000004c0)=0x5) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x4b7, 0x271, 0x4, 0x1, 0x0, 0x0, 0x8, 0x0, 0xd, 0x0, 0x0, 0x1, 0x9, 0x3, 0x0, 0x10001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0xffff000000000000, 0x0, 0x40, 0x0, 0xa92, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000005c0)}, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xe) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 169.622023] audit: type=1804 audit(1570113473.135:46): pid=7499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir353326819/syzkaller.TLx77N/32/file0" dev="sda1" ino=16613 res=1 [ 169.692604] device bridge_slave_1 left promiscuous mode [ 169.698595] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.765065] device bridge_slave_0 left promiscuous mode [ 169.779015] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.945046] device hsr_slave_1 left promiscuous mode [ 170.004082] device hsr_slave_0 left promiscuous mode [ 170.046676] team0 (unregistering): Port device team_slave_1 removed [ 170.082249] team0 (unregistering): Port device team_slave_0 removed [ 170.105215] audit: type=1804 audit(1570113473.825:47): pid=7523 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir353326819/syzkaller.TLx77N/32/file0" dev="sda1" ino=16613 res=1 [ 170.164727] audit: type=1804 audit(1570113473.855:48): pid=7522 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir353326819/syzkaller.TLx77N/32/file0" dev="sda1" ino=16613 res=1 [ 170.220434] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 170.298954] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 170.442274] bond0 (unregistering): Released all slaves [ 172.330884] IPVS: ftp: loaded support on port[0] = 21 [ 173.175934] chnl_net:caif_netlink_parms(): no params data found [ 173.216060] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.224178] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.233037] device bridge_slave_0 entered promiscuous mode [ 173.239848] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.246625] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.254082] device bridge_slave_1 entered promiscuous mode [ 173.277916] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 173.286902] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 173.306006] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 173.313352] team0: Port device team_slave_0 added [ 173.323725] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 173.331412] team0: Port device team_slave_1 added [ 173.336677] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 173.344191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 173.413417] device hsr_slave_0 entered promiscuous mode [ 173.463263] device hsr_slave_1 entered promiscuous mode [ 173.510744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 173.517710] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 173.536034] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.542592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.549198] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.555668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.599743] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 173.606535] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.617111] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 173.626561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.633728] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.640589] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.650238] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 173.656423] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.669081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.677208] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.683611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.704803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.712529] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.718881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.726415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.742500] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 173.752383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.762718] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 173.769250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.776516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.784174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.792114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.799801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.811870] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 173.825340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.950598] device bridge_slave_1 left promiscuous mode [ 173.956167] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.991477] device bridge_slave_0 left promiscuous mode [ 173.997164] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.132915] device hsr_slave_1 left promiscuous mode [ 174.172513] device hsr_slave_0 left promiscuous mode [ 174.213442] team0 (unregistering): Port device team_slave_1 removed [ 174.225053] team0 (unregistering): Port device team_slave_0 removed [ 174.235327] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 174.275570] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 174.348763] bond0 (unregistering): Released all slaves [ 174.395030] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 174.404729] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.415919] bridge0: port 1(bridge_slave_0) entered disabled state 14:37:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="860f4c0e57c99ca0ad78349f5803fd3a1a6d5cb848b66b3a3206a6bc000023b3483f5492d0616e6600df2b1e1a85f73de44b"], 0x1}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x8e) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:37:58 executing program 4: r0 = socket$inet(0x11, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f00000000c0)=0xffffffff, 0x4) sendmsg(r0, &(0x7f000087dfc8)={&(0x7f000005e000)=@nfc={0x27, 0x7}, 0x80, 0x0}, 0x0) 14:37:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:37:58 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 14:37:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:37:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:37:58 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc02812f8, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}) [ 174.607265] ptrace attach of "/root/syz-executor.1"[7547] was attempted by "/root/syz-executor.1"[7550] [ 174.633491] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 174.782022] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 176.180895] IPVS: ftp: loaded support on port[0] = 21 [ 177.050788] chnl_net:caif_netlink_parms(): no params data found [ 177.087362] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.093892] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.101221] device bridge_slave_0 entered promiscuous mode [ 177.107866] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.115352] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.122546] device bridge_slave_1 entered promiscuous mode [ 177.145789] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.155223] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.175965] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.183143] team0: Port device team_slave_0 added [ 177.188509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.195889] team0: Port device team_slave_1 added [ 177.201304] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.208508] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.272700] device hsr_slave_0 entered promiscuous mode [ 177.330562] device hsr_slave_1 entered promiscuous mode [ 177.374634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 177.381631] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 177.395675] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.402191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.408776] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.415148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.445302] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 177.452850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.461031] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 177.473322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.481032] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.487714] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.497015] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 177.503417] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.515045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.524011] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.530397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.551413] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.558991] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.565391] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.573097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.581014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.588475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.596247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.604106] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.614365] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 177.620679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.632576] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 177.643022] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.740823] device bridge_slave_1 left promiscuous mode [ 177.746442] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.790985] device bridge_slave_0 left promiscuous mode [ 177.797073] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.875280] device hsr_slave_1 left promiscuous mode [ 177.905311] device hsr_slave_0 left promiscuous mode [ 177.922055] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 177.969031] team0 (unregistering): Port device team_slave_1 removed [ 177.981235] team0 (unregistering): Port device team_slave_0 removed [ 177.990744] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 178.024925] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 178.041367] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, &(0x7f0000000280)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:01 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000f00f88)) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='w'], 0x1, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000480)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) 14:38:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)) 14:38:01 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) [ 178.088779] bond0 (unregistering): Released all slaves 14:38:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 178.185610] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 178.193346] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 14:38:02 executing program 4: 14:38:02 executing program 0: 14:38:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:02 executing program 1: 14:38:02 executing program 4: [ 178.352033] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:02 executing program 2: r0 = socket$kcm(0x11, 0xa, 0x300) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = socket$kcm(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000001640), 0x4) sendmsg(r3, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 14:38:02 executing program 0: 14:38:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:02 executing program 4: [ 180.471585] IPVS: ftp: loaded support on port[0] = 21 [ 181.388060] chnl_net:caif_netlink_parms(): no params data found [ 181.420860] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.427288] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.434366] device bridge_slave_0 entered promiscuous mode [ 181.441466] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.447856] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.454890] device bridge_slave_1 entered promiscuous mode [ 181.470807] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.479564] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.497323] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.504636] team0: Port device team_slave_0 added [ 181.510173] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.517244] team0: Port device team_slave_1 added [ 181.522662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.529932] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.583507] device hsr_slave_0 entered promiscuous mode [ 181.650470] device hsr_slave_1 entered promiscuous mode [ 181.720705] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.727636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.745966] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.752368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.758943] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.765322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.792236] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 181.798332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.806578] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 181.815766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 181.823214] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.829838] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.839118] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 181.845314] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.853627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 181.861430] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.867779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.876790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.884577] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.890969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.909720] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.919676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.930741] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 181.938169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.945885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.953451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.961452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.969018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 181.976212] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.988458] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 181.999226] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.380608] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 14:38:06 executing program 0: 14:38:06 executing program 1: 14:38:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:06 executing program 3: 14:38:06 executing program 2: 14:38:06 executing program 4: [ 183.171863] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:06 executing program 0: perf_event_open(&(0x7f0000001980)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:38:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c72d8d1766f3aad, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x6, 0x0) close(r4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000440)='\xaf\x14\x05\xb9\x18\x91-*];,\xadIy\x95c\x96[\xab8uY\xe2\x81o\xc2q\x87\x8dw\x80\xb6\xd0(\xe8\x13\aF\\\x82\x19S\xed\x8c\xe3\x82^\x91\x0f\xb3\xb5\a\xa6\xa2E)\xe0\x01\x12vw\x19,^\xb6\x1b\'J\x1f\xa5:\x84\xb6\x9a\x94b}#\x9cGH\xed\a\xd9\ax&:g\b\xdb\x11D\xa9\xb1\xe9>\x8c\xd0\x88\xcc\xc7Ji\xb1+~\xdba\xa7\xa0\xe95\xb6\xd84\xf9x\xcb8-C\xd5\xdf\xcf\x15\xe6\xe1)\v-)ku\xcb\x1f\xc2\xc2\xb8S\x9f,\x00!\xe3Pm*cR\xfb\xab\xf9e\x14\x10\x9fN\xe4\x99\x119\xbe\x85*\xc0|a>\xce\x1cB\xe1\x01\x06\x80\v!\xc7\t\x9e\xe5\x03\x86b+\xcc\xf8\x92/\xdc\xbaE6\xb7\xd1p\x1c\xc8\x90\xaa_\xfcr\xa6&\x1c\xb5\x8bb\xa3HXj\x99\xf0p\xbaNT\x80`D\xba\xa8\x84c\xa9\xe8\x1a@\x0es\xe8\xc6\x85\xb3-B8e\x88\xeb\xc3\xdb!\'\'\xe8\x8b\x107Xj\xbf\neq6\x7fr;W\x7f\x9692\xbc\xe7:\x1e\xb7\x14\xca\x95\xe9\x87\xa5\x83\x8b\x16\x15\x99\xb82q a\x17\xdc\x18\xb4\xd0a\xb5*V\x832\x9b`\f\xb5\xa3\xb2\x12\xba\xcfm\"\xd8\xfe5\xa6s\xa5m\xab\xe6l\x14\xf8\x17V\xd1\x89\xb5\x8b\xbd4\xa8\xf57\xa8\xaaZ`\xd5\xec\xb5\xab\xf9\xb8@\x1f\xcf\xdf\xbap\xce') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000130081c5e4050cecdb4cb9040a485e001600000000ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r6, &(0x7f0000001940)={&(0x7f0000000300)=@x25, 0x80, &(0x7f0000000780)=[{&(0x7f0000000000)=""/34, 0x22}, {&(0x7f0000000380)=""/13, 0xd}, {&(0x7f00000006c0)=""/110, 0x6e}, {&(0x7f0000000640)=""/62, 0x3e}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f0000000740)=""/31, 0x1f}], 0x6, &(0x7f0000001840)=""/232, 0xe8}, 0x40002042) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) sendmsg$kcm(r5, &(0x7f0000000800)={&(0x7f0000000200)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e23, 0x2}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)="5e317f98", 0x4}], 0x1}, 0xc0) openat$cgroup(r5, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x400, 0x5, 0x22d, 0x3, 0x0, 0x10000, 0x40, 0xc, 0x8001, 0x1f, 0x80, 0x80, 0x3721, 0x6, 0x6, 0x4, 0x47, 0x3, 0x85, 0x607, 0x0, 0x80, 0x0, 0x7, 0x5, 0x0, 0x1, 0x487, 0x7674e033, 0x80000000, 0x7, 0x800, 0x2, 0x3, 0x0, 0x10001, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000001980), 0x4}, 0x2200, 0x82a6, 0x80000000, 0x8, 0x200, 0x0, 0x7fff80000}, r2, 0x4, r0, 0x8) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xffffff25) 14:38:07 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f00000041c0)=ANY=[@ANYBLOB="238e7d3621a7442ac567540b9a2563be1cff64631fbbc54883627b6d"], 0x10094) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1a000) 14:38:07 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000340)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x64b3cb7426d54726) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000580)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a00000000000000fe8000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000007870bb75edae21bd5c8fcad9ccf1c2e1fcc42c6cdb0f4b6ce4a8ee641360cd77ee548da8b0233ff91ecc71dfb08f51e45faa0456"], 0x190) r1 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') readv(r1, &(0x7f0000000000)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1) 14:38:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa7"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa7"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa757"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 183.602826] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x23, 0x829, 0x0, 0x0, {0x1}}, 0x14}, 0x1, 0x6087ffffffff}, 0x0) 14:38:07 executing program 3: mlock(&(0x7f00008ee000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) 14:38:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x27, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa757"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0xa400295c) r1 = dup2(r0, r0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000017c0)) 14:38:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f3, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 14:38:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x402812f6, &(0x7f0000000080)={[], 0x0, 0x80000001, 0xff}) 14:38:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:07 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x200000008002) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0xbf}, @connect}], 0xffffff76) [ 184.152007] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x1, 0x0, "9c63e98a6e9a770ceacccaa0722f7b17adbfb251c09e588f2620a49bbec0a86bd1683c514036b5d2dab5a220e14e0020636e2b5a8d950a86ac1ccf681d083e2307d3f500"}, 0xd8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 14:38:08 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x64}}) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:08 executing program 0: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x16b, &(0x7f0000000280)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, @tcp={{0x0, 0x4e20, 0x42424242, 0x41424344, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, {[@sack_perm, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "7305fed2433a8972d7687ef8354f1134"}, @exp_fastopen={0xfe, 0x89, 0xf989, "b7f2e2"}, @md5sig={0x13, 0xcc, "f544acbd455e75e5f34826ac4200"}]}}}}}}}, 0x0) 14:38:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f00000005c0)={0x0, 0x0}) 14:38:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x400b}}, 0x1c}}, 0x0) 14:38:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 184.396654] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 184.460899] audit: type=1400 audit(1570113488.175:49): avc: denied { read } for pid=7780 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 14:38:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x3}}, 0x1c}}, 0x0) 14:38:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 184.552497] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x5, 0x0, 0x0, {{}, 0x0, 0x2}}, 0x1c}}, 0x0) 14:38:08 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000001c0)=0x4, 0x4) 14:38:08 executing program 0: [ 184.596174] Bearer rejected, not supported in standalone mode 14:38:08 executing program 0: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@random="c18e2c6afa2c", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x28, 0x2f, 0x0, @dev, @mcast2, {[@fragment={0x3c}], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:38:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x81000000}, @random='5a3XI\f', [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x8100, 0x8, 0x0, 0x4000000, 0x318], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0xffffca88], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x140, 0x80ffffff, 0x28, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5}}}}}}}}, 0x0) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:08 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x20800000003, 0x0) close(r1) [ 184.732081] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:08 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0x100000110) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_wait(r2, &(0x7f0000000100)=[{}], 0x2bb, 0xfffffffffffffffb) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r0) 14:38:08 executing program 2: syz_emit_ethernet(0x48, &(0x7f0000000080)={@random="c18e2c6afa2c", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x12, 0x0, 0x0, @dev, @mcast1, {[@fragment], @udp={0x0, 0x0, 0xa, 0x0, [], "fd9e"}}}}}}, 0x0) 14:38:08 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000f00f88)) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='w'], 0x1, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 14:38:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000540)=0x8, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:38:08 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000001c0)={'nat\x00'}, &(0x7f0000000140)=0x50) setsockopt(r0, 0x65, 0x1, &(0x7f0000000040)='\b', 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/vga_arbiter\x00', 0x400, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x10000, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='lp\x00', 0x27c) sendto$inet6(r1, 0x0, 0x0, 0x20040880, &(0x7f0000000040)={0xa, 0x4004e22, 0x0, @empty}, 0x1c) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:08 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) readv(r0, &(0x7f0000000c00)=[{&(0x7f00000008c0)=""/63, 0x2bd}, {&(0x7f0000000900)=""/78, 0x2a}, {&(0x7f0000000980)=""/27, 0x1b}, {&(0x7f0000000ac0)=""/14, 0xe}, {&(0x7f0000000b00)=""/1, 0x1}, {&(0x7f0000000b40)=""/83, 0x53}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/17, 0xfffffdcf}], 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") accept$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getgid() syz_genetlink_get_family_id$tipc(0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x7fffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) 14:38:08 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0x6, &(0x7f0000000000), 0x4) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 184.997789] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 185.021957] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, 14:38:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x808026, &(0x7f00000001c0)={[{@grpjquota_path={'grpjquota'}}], [], 0x700}) 14:38:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x28, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) [ 185.119980] audit: type=1400 audit(1570113488.835:50): avc: denied { name_bind } for pid=7875 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 185.204061] audit: type=1400 audit(1570113488.845:51): avc: denied { node_bind } for pid=7875 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 14:38:09 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x400000100002f, {0x0, 0x0, 0x2000}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa7\x8b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}) 14:38:09 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:38:09 executing program 1: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(0x0, &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0x78, r0) request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0) 14:38:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:09 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x64}}) 14:38:09 executing program 4: syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1a9b, 0x0) r0 = syz_open_dev$usbfs(0x0, 0x0, 0x0) mmap$usbfs(&(0x7f0000002000/0x4000)=nil, 0x204e00, 0x0, 0x11, r0, 0x0) [ 185.322015] EXT4-fs (sda1): re-mounted. Opts: grpjquota=, [ 185.337040] audit: type=1400 audit(1570113488.935:52): avc: denied { name_connect } for pid=7875 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 14:38:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x24, 0x33, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x43, @ipv4=@loopback}]}]}, 0x24}}, 0x0) [ 185.488367] audit: type=1400 audit(1570113489.205:53): avc: denied { map } for pid=7913 comm="syz-executor.4" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=941 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 14:38:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088471fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:38:09 executing program 3: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) 14:38:09 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) 14:38:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:09 executing program 1: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) 14:38:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:09 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0xe80, 0x0, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30806", 0x0, 0x400}, 0x28) 14:38:09 executing program 1: socket$key(0xf, 0x3, 0x2) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) 14:38:09 executing program 3: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) 14:38:09 executing program 2: getresuid(&(0x7f00000003c0), 0xffffffffffffffff, 0x0) 14:38:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff90b, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getpeername$ax25(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x0, 0x1c, 0xffffffffffffffc8, &(0x7f0000000640)="4d50b441e692763113ef8745ffa3960538bdef6e6245124e25d30800", 0x0, 0x400}, 0x28) 14:38:09 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) unshare(0x40600) io_setup(0x1ff, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0x5}]) r2 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r2, r0) 14:38:09 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 14:38:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:10 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20331d200050024584f315f110900070000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 2: r0 = socket$kcm(0x10, 0x40000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000002b000500000000648c6394f20931d200050024584f315f110900070000f0b906de559a0877e618767627", 0x2e}], 0x1}, 0x0) 14:38:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) socket$bt_rfcomm(0x1f, 0x0, 0x3) pipe(&(0x7f0000000080)) 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) pipe(0x0) 14:38:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) socket$bt_rfcomm(0x1f, 0x3, 0x3) pipe(&(0x7f0000000080)) 14:38:10 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3f9, 0x0, 0x0, 0x0, 0x0) 14:38:10 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 0: r0 = syz_open_procfs(0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) socket$bt_rfcomm(0x1f, 0x3, 0x3) 14:38:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, &(0x7f0000000000)) recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) socket$bt_rfcomm(0x1f, 0x3, 0x3) [ 186.855735] attempt to access beyond end of device [ 186.896494] loop2: rw=2048, want=3, limit=1 14:38:10 executing program 3: 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) [ 186.943305] hfsplus: unable to find HFS+ superblock 14:38:10 executing program 3: 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 4: 14:38:10 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3f9, 0x0, 0x0, 0x0, 0x0) 14:38:10 executing program 1: 14:38:10 executing program 4: 14:38:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x3b, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:10 executing program 3: [ 187.144335] attempt to access beyond end of device 14:38:10 executing program 1: 14:38:10 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) [ 187.181089] loop2: rw=2048, want=3, limit=1 14:38:10 executing program 4: 14:38:10 executing program 1: [ 187.228405] hfsplus: unable to find HFS+ superblock 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x3b, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 3: 14:38:11 executing program 1: 14:38:11 executing program 2: 14:38:11 executing program 3: 14:38:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, 0x0, 0x0) 14:38:11 executing program 4: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x3b, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 1: 14:38:11 executing program 3: 14:38:11 executing program 2: 14:38:11 executing program 4: 14:38:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, 0x0, 0x0) 14:38:11 executing program 1: 14:38:11 executing program 3: 14:38:11 executing program 2: 14:38:11 executing program 4: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x58, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, 0x0, 0x0) 14:38:11 executing program 1: 14:38:11 executing program 3: 14:38:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") syz_emit_ethernet(0x5e, &(0x7f0000000000)={@random="c18e2c6afa2c", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x28, 0x0, 0x0, @dev, @mcast2, {[@fragment], @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) 14:38:11 executing program 4: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x58, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 3: 14:38:11 executing program 0: 14:38:11 executing program 1: 14:38:11 executing program 2: 14:38:11 executing program 0: 14:38:11 executing program 2: 14:38:11 executing program 1: 14:38:11 executing program 4: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x58, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 0: 14:38:11 executing program 3: 14:38:11 executing program 2: 14:38:11 executing program 4: 14:38:11 executing program 1: 14:38:11 executing program 3: 14:38:11 executing program 0: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x67, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 2: 14:38:11 executing program 1: 14:38:11 executing program 4: 14:38:11 executing program 0: 14:38:11 executing program 3: 14:38:11 executing program 2: 14:38:11 executing program 1: 14:38:11 executing program 4: 14:38:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x67, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:11 executing program 0: 14:38:11 executing program 2: 14:38:11 executing program 3: 14:38:11 executing program 1: 14:38:11 executing program 4: 14:38:12 executing program 0: 14:38:12 executing program 2: 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x67, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:12 executing program 1: 14:38:12 executing program 3: 14:38:12 executing program 0: 14:38:12 executing program 4: 14:38:12 executing program 2: 14:38:12 executing program 1: 14:38:12 executing program 3: 14:38:12 executing program 2: 14:38:12 executing program 0: 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x6e, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:12 executing program 3: 14:38:12 executing program 4: 14:38:12 executing program 1: 14:38:12 executing program 2: 14:38:12 executing program 4: 14:38:12 executing program 1: 14:38:12 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x300, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000000) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0xfffffffffffffda5, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xd}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x6e, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000180)=""/66, &(0x7f0000000000)=0x42) inotify_init() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0x200840, 0x0) fcntl$addseals(r3, 0x409, 0x2) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x0, 0x40000000, 0x10000101) 14:38:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 188.639046] FAULT_INJECTION: forcing a failure. [ 188.639046] name failslab, interval 1, probability 0, space 0, times 1 [ 188.700276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=8255 comm=syz-executor.3 [ 188.725189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=8261 comm=syz-executor.3 [ 188.744960] CPU: 0 PID: 8254 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 188.751954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.761315] Call Trace: [ 188.763905] dump_stack+0x138/0x197 [ 188.767533] should_fail.cold+0x10f/0x159 [ 188.771682] should_failslab+0xdb/0x130 [ 188.775651] kmem_cache_alloc+0x2d7/0x780 [ 188.779812] ? __mutex_unlock_slowpath+0x71/0x800 [ 188.784645] ? check_preemption_disabled+0x3c/0x250 [ 188.789660] getname_flags+0xcb/0x580 [ 188.793463] SyS_mkdirat+0x85/0x210 [ 188.797078] ? SyS_write+0x15e/0x230 [ 188.800783] ? SyS_mknod+0x3b0/0x3b0 [ 188.804489] ? do_syscall_64+0x53/0x640 [ 188.808463] ? SyS_mknod+0x3b0/0x3b0 [ 188.812166] do_syscall_64+0x1e8/0x640 [ 188.816042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.820879] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.826056] RIP: 0033:0x459a29 [ 188.829235] RSP: 002b:00007fcc525a7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 188.836932] RAX: ffffffffffffffda RBX: 00007fcc525a7c90 RCX: 0000000000459a29 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x6e, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 188.844191] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 188.851450] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.858706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcc525a86d4 [ 188.865980] R13: 00000000004c60ad R14: 00000000004dafc0 R15: 0000000000000004 [ 188.888613] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:38:12 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x8) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0xad2b}, {0x101, 0x3}]}, 0x14, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x72, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 188.911264] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x72, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 188.971089] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 188.996667] devpts: called with bogus options [ 189.036916] input: syz0 as /devices/virtual/input/input7 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x72, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4d", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 189.082006] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:38:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x74, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49f", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:12 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 189.160243] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:38:12 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000100000000200"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1816}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) unshare(0x40040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa5c, 0x0, 0x0, 0x0, 0x1f6, 0xfff, 0x7, 0x5, 0x0, 0x5, 0x2, 0x0, 0x5, 0x8, 0x0, 0x400, 0x0, 0x2, 0x2, 0x9, 0x400, 0x4, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x9, 0x9}, 0x280, 0x5e, 0xeb67, 0x0, 0x0, 0x5, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x4200) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x200e80, 0x14) fanotify_init(0x0, 0x0) pipe(&(0x7f0000000440)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x800, 0xffffffc4) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) write$P9_RREAD(r2, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x152) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000040)=0x7e7) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000240)) close(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc020660b, &(0x7f00000001c0)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x65}}) socket$inet_sctp(0x2, 0x5, 0x84) syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) [ 189.214234] devpts: called with bogus options [ 189.227498] input: syz0 as /devices/virtual/input/input8 [ 189.259470] audit: type=1800 audit(1570113492.975:54): pid=8265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.1" name="bus" dev="sda1" ino=16710 res=0 [ 189.264347] FAULT_INJECTION: forcing a failure. [ 189.264347] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 189.293114] CPU: 0 PID: 8296 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 189.300038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.300044] Call Trace: [ 189.300066] dump_stack+0x138/0x197 [ 189.300081] should_fail.cold+0x10f/0x159 [ 189.300093] __alloc_pages_nodemask+0x1d6/0x7a0 [ 189.300102] ? fs_reclaim_acquire+0x20/0x20 [ 189.300112] ? __alloc_pages_slowpath+0x2930/0x2930 [ 189.300131] cache_grow_begin+0x80/0x400 [ 189.300144] kmem_cache_alloc+0x6a6/0x780 [ 189.300153] ? __mutex_unlock_slowpath+0x71/0x800 [ 189.300164] ? check_preemption_disabled+0x3c/0x250 [ 189.300178] getname_flags+0xcb/0x580 [ 189.300190] SyS_mkdirat+0x85/0x210 14:38:13 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x74, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49f", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 189.300199] ? SyS_write+0x15e/0x230 [ 189.300211] ? SyS_mknod+0x3b0/0x3b0 [ 189.300220] ? do_syscall_64+0x53/0x640 [ 189.300227] ? SyS_mknod+0x3b0/0x3b0 [ 189.338051] do_syscall_64+0x1e8/0x640 [ 189.338067] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.346216] audit: type=1800 audit(1570113493.035:55): pid=8266 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.1" name="bus" dev="sda1" ino=16710 res=0 [ 189.347134] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.355909] RIP: 0033:0x459a29 [ 189.364462] audit: type=1800 audit(1570113493.035:56): pid=8283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.1" name="bus" dev="sda1" ino=16710 res=0 [ 189.366923] RSP: 002b:00007fcc525a7c78 EFLAGS: 00000246 [ 189.374588] ORIG_RAX: 0000000000000102 [ 189.374594] RAX: ffffffffffffffda RBX: 00007fcc525a7c90 RCX: 0000000000459a29 [ 189.383343] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 189.383348] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.383352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcc525a86d4 [ 189.383357] R13: 00000000004c60ad R14: 00000000004dafc0 R15: 0000000000000004 14:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x74, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49f", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x0, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) [ 189.695983] IPVS: ftp: loaded support on port[0] = 21 14:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x0, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:13 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x8) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0xad2b}, {0x101, 0x3}]}, 0x14, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 14:38:13 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:13 executing program 2: setuid(0xee01) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbc}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x21e, 0x10, &(0x7f00000002c0), 0xfffffffffffffd02}, 0x48) r1 = getpid() socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000200)={0x1, 0x0, 0x727}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000e994d48069a5e565038e358a51c3473f1fc0dc2719737219d84dcb29ed71191bb5f4b1093120c866cf3fa9dec46066f11897b781ead6ede4ae175c870d707a34d5a5d2652b7e1d70f0d800e7148554e828e61ecfcbbb523af055c83e5e6e63e7e8a5b325c75ab6dcfcdee80331748841c6a414fcffb54affa3c68b08a7d6e12c11fc8d2f2bb852caebcc1436de59e7f1ec1ea7acc961f8d5d08684ad8fa6f9403904afd98e0dde7b6082556d6e28c1d5000000000000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000240)={0x401, 0x6}) prctl$PR_SET_FP_MODE(0x2d, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r4, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) getegid() bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r6}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0x2, &(0x7f00000000c0)='G\x00', r6}, 0x30) 14:38:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x0, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x40) 14:38:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:13 executing program 2: creat(&(0x7f0000000500)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0xa58a2577d29d83ad, 0x7}) [ 189.940896] devpts: called with bogus options [ 189.978736] input: syz0 as /devices/virtual/input/input9 14:38:14 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x220080, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000480)={0x2a36, 0x4000f75, 0x6, 0x0, 0x0, [], [], [], 0x7caa, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000700)="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", 0x141) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = fcntl$getown(r5, 0x9) process_vm_writev(r6, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/185, 0xb9}, {0x0, 0xfffffffffffffd9e}, {&(0x7f0000000640)=""/143, 0x8f}], 0x3, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x100001a5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x20}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d0875b6f631e76a6c3a9"], 0x1}}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r9 = gettid() fcntl$setown(r7, 0x8, r9) 14:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:38:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0xa4df422a86efe50d, 0x1, 0x4, 0x5}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$bt_hci(r0, 0x0, 0x0, &(0x7f0000000280)=""/97, &(0x7f0000000300)=0x61) r2 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x400000) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$kcm(0xa, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xad, "5e86d7fecdd0444b19bf24e06fec562a07e261b98a91433e48a87945a8f4fad61cf48f8c75314e6961c76f23ec762be691d2378a0dd30723c04079970295465e9a14a54a15f90dcb08ab98c480073c692de012737eda038a34b9cbbdefee6821bec126b56bd092a55b4521ac996e8419e260cb33176b5cbfbf750b83a08678ee6e37827de44e486a3b8770996f51524cb26df5eace94b24012205736dc73f931b2c85f28d79a8a124b57db75e6"}, &(0x7f0000000200)=0xb5) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000240)={r4, 0xffff}, 0x8) sendmsg$kcm(r3, &(0x7f0000001780)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2}, 0x0) 14:38:14 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) sync_file_range(r2, 0x0, 0x6, 0x2) write$binfmt_aout(r1, &(0x7f0000000240)={{0xed81448857737295, 0x8f, 0x1, 0x2e, 0x381, 0x100, 0x1cc, 0x10000}, "a3944254b65a485e87c9e4e99f429e9b4951ecd843", [[], []]}, 0x235) mkdirat(r0, &(0x7f0000000200)='./file0/file0\x00', 0x0) 14:38:14 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:38:14 executing program 2: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fdatasync(r2) 14:38:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f0000000100)) 14:38:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/softnet_stat\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0}, 0x40) 14:38:14 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) connect$rose(r0, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x2000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)=0x81, 0x4) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="fa2fa28c9e66"]) 14:38:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) setsockopt$sock_void(r2, 0x1, 0x48, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x1ff) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 190.894417] FAT-fs (loop2): Unrecognized mount option "ú/¢Œžf" or missing value [ 190.952895] device nr0 entered promiscuous mode [ 190.971864] dccp_close: ABORT with 1 bytes unread 14:38:14 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x220080, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000480)={0x2a36, 0x4000f75, 0x6, 0x0, 0x0, [], [], [], 0x7caa, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000700)="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", 0x141) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = fcntl$getown(r5, 0x9) process_vm_writev(r6, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/185, 0xb9}, {0x0, 0xfffffffffffffd9e}, {&(0x7f0000000640)=""/143, 0x8f}], 0x3, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x100001a5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x20}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d0875b6f631e76a6c3a9"], 0x1}}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r9 = gettid() fcntl$setown(r7, 0x8, r9) 14:38:14 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='#\x00\x00\x00\x00\x00\x00\x00\x000\n'], 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r5 = getuid() r6 = getgid() write$FUSE_DIRENTPLUS(r3, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB], 0xa4) r7 = geteuid() r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r10 = geteuid() r11 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r13 = getuid() r14 = getgid() write$FUSE_DIRENTPLUS(r11, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r12, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB], 0xa4) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) r18 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r20 = getuid() r21 = getgid() write$FUSE_DIRENTPLUS(r18, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r19, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB], 0xa4) r22 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r24 = getuid() r25 = getgid() write$FUSE_DIRENTPLUS(r22, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r23, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB], 0xa4) r26 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x0) fstat(r26, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000580)=[0xee00, 0xee01]) r29 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r31 = getuid() r32 = getgid() write$FUSE_DIRENTPLUS(r29, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r30, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r31, @ANYRES32=r32, @ANYBLOB], 0xa4) r33 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r35 = getuid() r36 = getgid() write$FUSE_DIRENTPLUS(r33, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r34, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r35, @ANYRES32=r36, @ANYBLOB], 0xa4) r37 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r39 = getuid() r40 = getgid() write$FUSE_DIRENTPLUS(r37, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r38, @ANYRES32=0xee00, @ANYBLOB="0001000000ffe08000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f00001e0000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b000003000000000000000000", @ANYRES32=r39, @ANYRES32=r40, @ANYBLOB], 0xa4) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x3, r2}, {0x2, 0x4, r5}, {0x2, 0x0, r7}, {0x2, 0x5, r9}, {0x2, 0x1, r10}, {0x2, 0x6, r13}, {0x2, 0x6, r15}], {0x4, 0x7}, [{0x8, 0x7, r17}, {0x8, 0x1, r21}, {0x8, 0x3, r25}, {0x8, 0x2, 0xee00}, {0x8, 0x7, r27}, {0x8, 0x2, r28}, {0x8, 0x2, r32}, {0x8, 0xc, r36}, {0x8, 0x4, r40}], {0x10, 0x7}, {0x20, 0x1}}, 0xa4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6, 0x0, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpriority(0x1, r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 14:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 14:38:14 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:14 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) recvmsg(r1, &(0x7f0000001680)={&(0x7f0000000100)=@hci, 0x80, &(0x7f0000001600)=[{&(0x7f0000000180)=""/50, 0x32}, {&(0x7f00000001c0)=""/248, 0xf8}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/217, 0xd9}, {&(0x7f0000000400)=""/235, 0xeb}, {&(0x7f0000000500)=""/33, 0x21}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/185, 0xb9}], 0x8}, 0x40000003) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_MCE_KILL_GET(0x22) 14:38:14 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x14241, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB], 0xa4) setgid(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7faf7bc387e55ea, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x100}, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r6, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000400)={0x3, 0x6, 0x1, 0x800, 0x5ccf, 0x8}) stat(0x0, 0x0) lstat(0x0, 0x0) add_key(&(0x7f0000000540)='big_key\x00', 0x0, &(0x7f00000005c0)="3ad332c8de86787575e4d6d1ffd44a0a2150ce9e9fff0b379fe87498528a04ad006b382a01ac6f45e0f7f9fe399d2dc304c1382cb03239a3f5c468782865b4ae4a5cb07d211ab39c28769a87ea8e6619542cf7495ba6f23f278616a2874d2d204a44c67433c541caf0a6e2dd3499ba67a5ec28fde086913f3bc8881f", 0x7c, 0xfffffffffffffff9) setgroups(0x1, &(0x7f00000003c0)=[r5]) 14:38:14 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) 14:38:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 14:38:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x14241, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB], 0xa4) setgid(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7faf7bc387e55ea, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x100}, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r6, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000400)={0x3, 0x6, 0x1, 0x800, 0x5ccf, 0x8}) stat(0x0, 0x0) lstat(0x0, 0x0) add_key(&(0x7f0000000540)='big_key\x00', 0x0, &(0x7f00000005c0)="3ad332c8de86787575e4d6d1ffd44a0a2150ce9e9fff0b379fe87498528a04ad006b382a01ac6f45e0f7f9fe399d2dc304c1382cb03239a3f5c468782865b4ae4a5cb07d211ab39c28769a87ea8e6619542cf7495ba6f23f278616a2874d2d204a44c67433c541caf0a6e2dd3499ba67a5ec28fde086913f3bc8881f", 0x7c, 0xfffffffffffffff9) setgroups(0x1, &(0x7f00000003c0)=[r5]) 14:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 14:38:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x1, 0x0, 0x0, 0xbd}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f00000001c0)) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000100)=0x9) 14:38:15 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x14241, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB], 0xa4) setgid(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7faf7bc387e55ea, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x100}, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r6, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000400)={0x3, 0x6, 0x1, 0x800, 0x5ccf, 0x8}) stat(0x0, 0x0) lstat(0x0, 0x0) add_key(&(0x7f0000000540)='big_key\x00', 0x0, &(0x7f00000005c0)="3ad332c8de86787575e4d6d1ffd44a0a2150ce9e9fff0b379fe87498528a04ad006b382a01ac6f45e0f7f9fe399d2dc304c1382cb03239a3f5c468782865b4ae4a5cb07d211ab39c28769a87ea8e6619542cf7495ba6f23f278616a2874d2d204a44c67433c541caf0a6e2dd3499ba67a5ec28fde086913f3bc8881f", 0x7c, 0xfffffffffffffff9) setgroups(0x1, &(0x7f00000003c0)=[r5]) [ 191.501623] device nr0 entered promiscuous mode 14:38:15 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x220080, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000480)={0x2a36, 0x4000f75, 0x6, 0x0, 0x0, [], [], [], 0x7caa, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000700)="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", 0x141) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = fcntl$getown(r5, 0x9) process_vm_writev(r6, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/185, 0xb9}, {0x0, 0xfffffffffffffd9e}, {&(0x7f0000000640)=""/143, 0x8f}], 0x3, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x100001a5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x20}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d0875b6f631e76a6c3a9"], 0x1}}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r9 = gettid() fcntl$setown(r7, 0x8, r9) 14:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x2e, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250a"}, 0x40) 14:38:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$P9_RLOCK(r1, &(0x7f0000000100)={0x8, 0x35, 0x2, 0x3}, 0x8) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:15 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x14241, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB], 0xa4) setgid(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7faf7bc387e55ea, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x100}, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r6, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000400)={0x3, 0x6, 0x1, 0x800, 0x5ccf, 0x8}) stat(0x0, 0x0) lstat(0x0, 0x0) add_key(&(0x7f0000000540)='big_key\x00', 0x0, &(0x7f00000005c0)="3ad332c8de86787575e4d6d1ffd44a0a2150ce9e9fff0b379fe87498528a04ad006b382a01ac6f45e0f7f9fe399d2dc304c1382cb03239a3f5c468782865b4ae4a5cb07d211ab39c28769a87ea8e6619542cf7495ba6f23f278616a2874d2d204a44c67433c541caf0a6e2dd3499ba67a5ec28fde086913f3bc8881f", 0x7c, 0xfffffffffffffff9) setgroups(0x1, &(0x7f00000003c0)=[r5]) 14:38:15 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200800, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x14241, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYRES32=0xee00, @ANYBLOB="0001000001000080000000000500000000000000f80000000000000005000000000001006675736500000000050000000000000000000000000000007f0000000000000048090000000000000200000004000000000000000000000006000000000000000f000000000000001f000000000000000000008000000000ad0a000000000000050000004f0b00000300000000000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB], 0xa4) setgid(r4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2, 0x4}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7faf7bc387e55ea, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x100}, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) stat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) read(r6, &(0x7f0000000340)=""/128, 0x80) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r7, 0xc058534b, &(0x7f0000000400)={0x3, 0x6, 0x1, 0x800, 0x5ccf, 0x8}) stat(0x0, 0x0) lstat(0x0, 0x0) add_key(&(0x7f0000000540)='big_key\x00', 0x0, &(0x7f00000005c0)="3ad332c8de86787575e4d6d1ffd44a0a2150ce9e9fff0b379fe87498528a04ad006b382a01ac6f45e0f7f9fe399d2dc304c1382cb03239a3f5c468782865b4ae4a5cb07d211ab39c28769a87ea8e6619542cf7495ba6f23f278616a2874d2d204a44c67433c541caf0a6e2dd3499ba67a5ec28fde086913f3bc8881f", 0x7c, 0xfffffffffffffff9) setgroups(0x1, &(0x7f00000003c0)=[r5]) 14:38:15 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) recvmsg$kcm(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000001600)=""/4096, 0x1c80}], 0x1}, 0x40012100) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x2e, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250a"}, 0x40) 14:38:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 14:38:16 executing program 0: socket$unix(0x1, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x2e, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250a"}, 0x40) 14:38:16 executing program 2: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x220080, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000480)={0x2a36, 0x4000f75, 0x6, 0x0, 0x0, [], [], [], 0x7caa, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000700)="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", 0x141) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = fcntl$getown(r5, 0x9) process_vm_writev(r6, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/185, 0xb9}, {0x0, 0xfffffffffffffd9e}, {&(0x7f0000000640)=""/143, 0x8f}], 0x3, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x100001a5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x20}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d0875b6f631e76a6c3a9"], 0x1}}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r9 = gettid() fcntl$setown(r7, 0x8, r9) [ 192.528262] device nr0 entered promiscuous mode [ 192.708869] dccp_close: ABORT with 1 bytes unread 14:38:16 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) close(0xffffffffffffffff) r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, &(0x7f0000000100)=@ethernet, &(0x7f0000000180)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x220080, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f0000000480)={0x2a36, 0x4000f75, 0x6, 0x0, 0x0, [], [], [], 0x7caa, 0x6}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r4, 0x10d, 0x800000000d, &(0x7f0000000700)="07d46c8e3963bef1855a3907e3ada98ff400d535bca5a88523a4570c2c3dc139b128d75bf990b1010fdb2ffac1dacf3b24c3ea82c8276bb5c259c3c4a11084a46aea90273a2eaabc11d8dff0fe8bc65578eaf2145a97e646f489491476f5f85e2c68418d94c9f8dd509f83e8229aac9a7a88147afb59d8e1110c034927ccf989ab98e852baa6fe410dfd426fb711c912fec7abbc5124e115534819f57006c8803966de673a0705a965472c1cef0bacac6f5b81db328fd67d9d54e50b2f5cbffaa6f29a191de49adb2d65ccca3eb3384b08584e76df094464c4ee4dc3591ebe4120114e906a51e5a8f58d14ae5ea688eb099a8fc6bf412622d5c728f7409fcf2900a969e9e12137b1598d1e13deb95c0f419449da1f75c0520d568184fbd2cfe3767d1bd624fd69e206457d957f32be6898e82b9f24c479499cff126ca073ece82f", 0x141) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = fcntl$getown(r5, 0x9) process_vm_writev(r6, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/185, 0xb9}, {0x0, 0xfffffffffffffd9e}, {&(0x7f0000000640)=""/143, 0x8f}], 0x3, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x100001a5, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000040)={0x20}) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r8 = accept(r1, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d0875b6f631e76a6c3a9"], 0x1}}, 0x0) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r9 = gettid() fcntl$setown(r7, 0x8, r9) 14:38:16 executing program 4: gettid() msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='./file1/file0\x00') close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, 0x6, 0x1f, 0x0, 0x12, "8eb5935c2940fd1ba4871d1031b533e02848"}, 0x1e) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000580)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) link(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000240)='./file2\x00') r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000040)) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0/file1/file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x2000, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000003c0)={0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x2, 'lblcr\x00', 0x2c, 0x3, 0xf}, 0xf) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="6d657461636f70793d6f6e2c696e6465783d6f66662c64656661756c745f7065726d697333a356713d2773696f6e732c6e66735f6558706f72743d6f66662c6e4a735f6578706f72743d6f66662c706572a34a855bae04168b806d69745f646972586374696f2c6f626a6f7c515fe97c019a5f757365733d2f6465762f6c6f6f"]) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xfffffffffffffe30, 0xfa00, {0x0, &(0x7f00000000c0), 0x0, 0x2}}, 0x297) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @multicast2}, 0x100, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000040)='batadv0\x00', 0x4, 0x3, 0x7}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000440)}}, 0x18) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) syz_open_dev$sndpcmc(&(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', 0x4, 0x8000) sendto$isdn(0xffffffffffffffff, &(0x7f0000000880)={0x1, 0x0, "dd8198f8cd3de958a6283bae3adeaba1146b5d5dc6607c45f330b64c96816236f29cc057866579d5a174f47446af9d4abed93da1ad4c1cdfb6579b28a13987d5dbb98439041acf05541e2d3083d9dfd653eed581a63dc13441adc03c8bfb5ea13c5a9d69fc9d1b7bc26f1bf69a0a551dfb2c724445423430614c4f9d76cbf8a1b4034cb4778ab5db0fd5a1fe2d4c6ceebf97704a9340b48938dce520a3c0f6f7a0b30276236f03c043f58ee51da4d72f18e579ae8f82675c38a23893147656505cca5d863a0fa74ac7fa52990c6d609cfd8f1a742730573c5e4daa5fb11554f083e74a031fb2cae4"}, 0xf0, 0x0, &(0x7f0000000980)={0x22, 0x1, 0x7, 0x1f, 0x5}, 0x6) openat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x80000, 0x2) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x38d00c92cff06ac5, &(0x7f0000000140)=""/170, 0x0) 14:38:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) write$P9_RLINK(r0, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x45, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f701"}, 0x40) 14:38:16 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:16 executing program 2: r0 = semget(0x0, 0x3, 0x400) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/24) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4080}, [@IFLA_LINKINFO={0x24, 0x12, @bridge={{0xfffffffffffffe33, 0x1, 'bridge\x00'}, {0x14, 0x2, [@IFLA_BR_MCAST_ROUTER={0x8, 0x16, 0x2}, @IFLA_BR_MCAST_MEMBERSHIP_INTVL={0x8, 0x1f, 0x5}]}}}]}, 0x44}}, 0x0) 14:38:16 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fgetxattr(r1, &(0x7f0000000180)=@random={'os2.', 'task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'}, &(0x7f0000000200)=""/221, 0xdd) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x200) [ 193.095719] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x45, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f701"}, 0x40) [ 193.175324] overlayfs: unrecognized mount option "metacopy=on" or missing value 14:38:16 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x2) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000001c0)=0x4) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) fcntl$dupfd(r1, 0x0, r2) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) write$P9_RCLUNK(r0, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x5, 0x11, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000080)=0x3, &(0x7f00000000c0)=0x1) 14:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x45, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f701"}, 0x40) [ 193.313833] overlayfs: filesystem on './file0' not supported as upperdir 14:38:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="00008a2a00c231dce51166a85667c35e921e9effcb9047f87189be6af0bf61fb1b22dbe06d8be9346fe1afbcc0a6f743130bd5929817f917a0a4f1b419ce82"]) clone(0x80000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0/file0\x00', 0x20043, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0x1, 0x0, 0x0, 0x2, 0x2dbf, 0x6, 0x1, 0x0, 0x2, 0x5, 0x204, 0x8, 0x4, 0xffffffff, 0x1, 0x8}}) [ 193.355709] overlayfs: unrecognized mount option "metacopy=on" or missing value [ 193.388730] device nr0 entered promiscuous mode 14:38:17 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000140)={0x200, 0x7}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) fcntl$getown(r1, 0x9) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)) r3 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r3}, &(0x7f0000044000)) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r5}) r6 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r6}, &(0x7f0000044000)) r7 = syz_open_procfs(r6, &(0x7f0000000380)='net/\x04\x00\x00\x00\x00\x00\x19o\xd1\xa1\xaa\x1b\x18\xb6\xcf\x00\x00if\x00') r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) ioctl$TIOCGETD(r8, 0x5424, &(0x7f0000000100)) mkdirat(r7, &(0x7f0000000000)='./file0\x00', 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x8902, 0x0) 14:38:17 executing program 4: fchdir(0xffffffffffffffff) r0 = socket$packet(0x11, 0x0, 0x300) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xc, "92afb06208b822b47d8dc3"}, 0xd, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000000000a8deecc"], 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) 14:38:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xfffffea0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x10000018}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000380)={{0x2, 0x4, 0x9, 0xfff, 'syz1\x00', 0x5}, 0x0, [0x0, 0x78e200000000000, 0x8, 0xd06, 0x8, 0x7, 0x3, 0x81, 0xfffffffffffffffb, 0x6, 0x8, 0x6, 0x62, 0x5, 0x7, 0x2800000000000, 0x1, 0x40, 0x6, 0x1, 0x1, 0x9, 0xfffffffffffff000, 0x86, 0x400, 0xfe4c, 0x3, 0x1ff, 0x101, 0x7e7, 0x8, 0x8, 0x3680, 0xdaab, 0x9, 0x7, 0x8, 0x0, 0x5, 0x6, 0x3, 0x9, 0x4, 0x2, 0x1, 0x5, 0x8, 0x8, 0x795, 0x1, 0x7af77dae, 0x3800000, 0x0, 0x4, 0x5, 0x2, 0x7, 0xffff, 0x1, 0x0, 0xffffffff, 0x4, 0x3ff, 0x0, 0xf7, 0x3f, 0x6, 0x9, 0x2, 0x57d1, 0x8, 0x6, 0x4, 0x1000, 0x6e2, 0x9, 0x80000000, 0x8, 0x100, 0x5, 0x5, 0x5, 0x1, 0x80, 0x1, 0x36c8, 0x3, 0x100, 0x5, 0x0, 0x0, 0x1ff, 0x1714, 0x24000000000, 0x3, 0x8, 0x0, 0x8, 0xffffffff, 0x7, 0xef, 0x0, 0x8, 0x7, 0x5, 0xf7, 0x4, 0x100000001, 0xff, 0xfffffffffffffff9, 0x4, 0x2, 0x1000, 0x8, 0x2, 0x4, 0x39, 0x8, 0x100, 0x1ff, 0x5, 0x2, 0xfff, 0x7ff, 0xff, 0x7, 0xfff, 0x162b]}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r5, 0x16) 14:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x51, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a4"}, 0x40) 14:38:17 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:17 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000140)='p\x00') mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_open_dev$radio(&(0x7f0000000400)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000440)={0xb, @raw_data="de6c109b19803bf3f3720da0b8a6d70152a9b25f2da750c73cf17047ec432f70b453a2e8cc4f22918eeb728fe60836c5357c5fbec497d180bf8eeb79e1c223d2fe7aeaefad94ba931a4e55bb3285173ba607e3ed2609da9b16a04d96284eaedc15e73a01495df10afb9a187b696deab9b142ed07d37980e87d0d49a4ca7f3ffed1e209f6e3da22f5bc9fc165b66220704ecc567d9f20965d2364d19b72e28a635ed7d01304dd9a5925aaf47052b4b3d162d9a226e859913d6415ab6e130b8c45cb7622fd09db9624"}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x9ad, 0x6080) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) ioctl$KVM_GET_TSC_KHZ(r5, 0xaea3) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000780)={0x7fffffff, 0x1f, 0x7}, 0xc) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000580), &(0x7f00000005c0)=0x4) write$binfmt_elf32(r2, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x178) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) execveat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='bdev-keyring[\x00', &(0x7f00000000c0)='p\x00', &(0x7f0000000180)='\xea\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='p\x00', &(0x7f0000000240)='eth1em1cpuset\x00', &(0x7f0000000280)='p\x00', &(0x7f00000002c0)='cgroupGPL/lo:user!\x00', &(0x7f0000000300)='p\x00', &(0x7f0000000340)='cgroup+wlan0\\wlan1-\x00', &(0x7f0000000380)='p\x00'], 0x100) 14:38:17 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 194.012963] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x51, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a4"}, 0x40) 14:38:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x1f0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) 14:38:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x51, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a4"}, 0x40) 14:38:17 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) r1 = syz_open_procfs(r0, &(0x7f0000000180)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x90000, 0x0) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) [ 194.184113] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x57, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a"}, 0x40) 14:38:18 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 194.320582] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 194.387601] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 194.419554] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 14:38:18 executing program 4: fchdir(0xffffffffffffffff) r0 = socket$packet(0x11, 0x0, 0x300) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0xc, "92afb06208b822b47d8dc3"}, 0xd, 0x7) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000000000a8deecc"], 0x30}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) [ 194.460696] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 194.499238] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 194.526330] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 194.580279] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 14:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x57, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a"}, 0x40) 14:38:18 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r0, 0x0, 0x85, 0x90, &(0x7f0000000100)="38e90592d49ce19be59b5066d4ce818feb40a9af98ad016fbba9477388c61d2d9fd343717017408209507aee978cb0402cdf8b9aec82d7c455612dc8ccd7f9524e22451ba86f66d6fa207a8fa1ae44ce087ed3f58099871af246805177c4fee64675e128427fde80fcd087974f859d2ef9f638cf6783ca1dc035f202b881cc8b733baad529", &(0x7f00000001c0)=""/144, 0x9, 0x0, 0x1000, 0x73, &(0x7f0000000280)="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", &(0x7f0000001280)="1a41c74c56e07ee8430cd880d8b7664df24dcd88fc1c6faaa230f6a49f72b25106b341b7f781b0f527b92f640ffcc513a66773503446c6f57024bf73d78551e9713e6008d120c139d8f054f6162e081b49e4ea377448b31286f71d012e1c097aa290bcef8c5f950be1372a02fd1e9cb69fee18"}, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:18 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:18 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x75, 0x40000002, r1, 0x0) close(r0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x6000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000000c0)={0x3c7, 0xf186, 0xa75c, 0x0, 0x0, [], [], [], 0xfffffc00, 0xa3}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f0000000280)={0x13c26f83c77411c9, @reserved}) chmod(&(0x7f0000000000)='./file0\x00', 0x4) r8 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 14:38:18 executing program 1: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x57, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a"}, 0x40) 14:38:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x16b) 14:38:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000011c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd') ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x0) write$FUSE_DIRENTPLUS(r7, &(0x7f0000001ac0)=ANY=[@ANYPTR=&(0x7f0000001d80)=ANY=[@ANYRES32=r9], @ANYRES32=r2, @ANYRESDEC, @ANYPTR64=&(0x7f0000001dc0)=ANY=[@ANYRESHEX=r10], @ANYRES32=r0, @ANYRESDEC=r3, @ANYBLOB="d8c5494c80e12cf59aa57c2bf265f2b3bfee82a6a57072540e244129ce5870709a96976f846bc42a552e135025c58fda66310289c7c73448e3e3110986e8e00d1a0140ccf3"], 0x40) r11 = getgid() syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x6, &(0x7f0000001840)=[{&(0x7f0000001480)="ade9ebf5d4d66d084b0f75e47ca9b2241ff0a175126fdbf4bdf3c31ef59c3568990608d593e02f3d65f038fdaed45e6e795f85b936b77c84babdc81780d6645d62de86a4b60c53130f105181dc96d6108d6c1088eb441aa2071512aaf302888fcdc2df5620105ffee7f952046ffc5b8a277d7469049bc06372272eec9cb0f17af2b20161b94519f5f116c5bbe9880483f93325f53e37ffe0a2bd2ce7f9f747136ee0c3cbab3ac041bb596ec6b5bc5cd4787cc5e24ee904", 0xb7}, {&(0x7f0000001540)="bd207b199b74765be55c90ff4042d05b6ef7b147b9aa98a9c6133ba0eb0f623be63428437c34c99a4aab624ad51fc2cf1c188ad8fb43ae46ee347e698bfb2e804bb14233ae20e775aada722bd2c2a1b995caf32162bbf37a408021f00bef66d5b0919afb3316e664687e1b194053b472267d850720aa23900b1edc18e65706dd04b1bf406cd3a01ac717ec1027cd86fcd2fc53b4a880e75044623e07fa8b07d5212504437e879d7189fcb333d5fa39d707bfb0ad9e5b91653606f5379538593a77ba489ffc5360e1776494c87688", 0xce, 0x9}, {&(0x7f00000019c0)="6fe3653ba3dc51bd5a8331f0671e99b27bf97475c8ae8161a79af0893e850d7b9ca1fe7ea44e457b2069cb4e006f38ac546afef6a07490f5e7a393f314563d8a646341056e52962108c533b52788b95643711944300a82f8d41403a3bb069af52a78d608d65686f49a03632640aefddff0474a14070edc3f26044ec9fe05e90c06f68595c0653a4c002cf3d50c944f121ca4c3d9de6aa27ebe9908faca5c87f44a45ff30c84acc2c6a4d8cc86b76c6d7e7d601060e33212d0aff3fc14799c00b55fcb3ff48d29f44dd3222ee94494386868e11504b6e866984c3aaed6209dfbe03563c5c4835c55d2e", 0xe9, 0x5}, {&(0x7f0000001640)="c0c0a3ec3ad00027ce4650f8151d3a9ca5cf7423fa71f07b5ba59c23234183bb9b05dba0b0a988648bdc6abef11ebdac99b5aed7e7de372a7ed2d9c151f05bf6033577c742a1318ba5cb47f903436daa3e300f55f4aa824946d5f42656edca6f1e6374", 0x63}, {&(0x7f00000016c0)="a0ab55ef63ce3b4dd6fc9fb10903eeee5d1cfbc1f6864b2701ba05d92e1865eb74d39172d7e9a0aa4926b383cff3c613965eaac1c9f4321e3aa4bbd26424f6bf78d956c7e16e97b47fe63faa7d5654589072b4eb7734baf94016a5b890f6796546ef7651cb976e40a0c6b882323bc1a29bf72d35430cb7a9f11acd59330bdd6532225ce0f75f37bbf842b5", 0x8b, 0x4}, {&(0x7f0000001780)="2ed399f059427ed32f229ec01374a25940c47b65495071ae1a2621372d4538f16821a99901599ba16fdaf5161c080e4b512d206c8c80ce53b20b41a9a5d25bd4b7daa6349d39a70b0cd476617eb37b7f7ed854ed4a49e6a8066cddc6660c0253710922679b0487d1ba8cd0324b62fa4824c8d53ddc83f02c7fcec90ca9571c9fec97c0be3c33fe1eb6494ab3ca0229fd080a24326d804f453639a3c862104dbea8b035a605b9352221f63116e2fa9200eaa5ef49", 0xb4, 0x100000001}], 0x4000, &(0x7f0000001900)={[{@session={'session', 0x3d, 0x5f}}, {@gid={'gid', 0x3d, r4}}, {@session={'session', 0x3d, 0xf752620}}, {@barrier='barrier'}, {@nobarrier='nobarrier'}, {@gid={'gid', 0x3d, r11}}, {@umask={'umask'}}, {@nls={'nls', 0x3d, 'maccroatian'}}], [{@dont_appraise='dont_appraise'}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in=@multicast2, @in6=@remote}}, {{@in=@loopback}, 0x0, @in6}}, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 14:38:18 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5a, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a520260"}, 0x40) 14:38:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mq_timedsend(r0, &(0x7f0000000180)="10ca9fcd1eb0cfc61d534b7243d1c54fbac31f1bccbf15416f7b2d153a7ede115b60a6b93f738151e0b70b631797e0f08395b49e9853a6acdb971ca9604489c06cf219c26d5c61feccf94667aeb804e86571daaa1a0af2d7e616be3034cb8bb8a1c10d9068315d74ad665ed035b49f0919909682add9721f970e9f3b950834a9ea9f957b6df42a1fa6f7806af35ad3d9f99e1b587bd1c55bbd5117c46698cfee433ffc1fc2cac63405668b9083bd8d90cca14f642a0a771789d3", 0xba, 0x40, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000140)=0x9) 14:38:18 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 195.194404] hfsplus: unable to parse mount options 14:38:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5a, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a520260"}, 0x40) 14:38:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 195.305366] hfsplus: unable to parse mount options 14:38:19 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) socket$inet(0x2, 0x6, 0x1f) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 195.331978] audit: type=1800 audit(1570113499.055:57): pid=8645 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.4" name="bus" dev="sda1" ino=16766 res=0 14:38:19 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x75, 0x40000002, r1, 0x0) close(r0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x6000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000000c0)={0x3c7, 0xf186, 0xa75c, 0x0, 0x0, [], [], [], 0xfffffc00, 0xa3}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200004) sendfile(r0, r4, 0x0, 0x80001d00c0d0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f0000000280)={0x13c26f83c77411c9, @reserved}) chmod(&(0x7f0000000000)='./file0\x00', 0x4) r8 = dup3(r6, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5a, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a520260"}, 0x40) 14:38:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) readv(0xffffffffffffffff, &(0x7f0000002340), 0x0) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000011c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd') ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000000)=0xc) r3 = getuid() r4 = getgid() r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x0) write$FUSE_DIRENTPLUS(r7, &(0x7f0000001ac0)=ANY=[@ANYPTR=&(0x7f0000001d80)=ANY=[@ANYRES32=r9], @ANYRES32=r2, @ANYRESDEC, @ANYPTR64=&(0x7f0000001dc0)=ANY=[@ANYRESHEX=r10], @ANYRES32=r0, @ANYRESDEC=r3, @ANYBLOB="d8c5494c80e12cf59aa57c2bf265f2b3bfee82a6a57072540e244129ce5870709a96976f846bc42a552e135025c58fda66310289c7c73448e3e3110986e8e00d1a0140ccf3"], 0x40) r11 = getgid() syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x6, &(0x7f0000001840)=[{&(0x7f0000001480)="ade9ebf5d4d66d084b0f75e47ca9b2241ff0a175126fdbf4bdf3c31ef59c3568990608d593e02f3d65f038fdaed45e6e795f85b936b77c84babdc81780d6645d62de86a4b60c53130f105181dc96d6108d6c1088eb441aa2071512aaf302888fcdc2df5620105ffee7f952046ffc5b8a277d7469049bc06372272eec9cb0f17af2b20161b94519f5f116c5bbe9880483f93325f53e37ffe0a2bd2ce7f9f747136ee0c3cbab3ac041bb596ec6b5bc5cd4787cc5e24ee904", 0xb7}, {&(0x7f0000001540)="bd207b199b74765be55c90ff4042d05b6ef7b147b9aa98a9c6133ba0eb0f623be63428437c34c99a4aab624ad51fc2cf1c188ad8fb43ae46ee347e698bfb2e804bb14233ae20e775aada722bd2c2a1b995caf32162bbf37a408021f00bef66d5b0919afb3316e664687e1b194053b472267d850720aa23900b1edc18e65706dd04b1bf406cd3a01ac717ec1027cd86fcd2fc53b4a880e75044623e07fa8b07d5212504437e879d7189fcb333d5fa39d707bfb0ad9e5b91653606f5379538593a77ba489ffc5360e1776494c87688", 0xce, 0x9}, {&(0x7f00000019c0)="6fe3653ba3dc51bd5a8331f0671e99b27bf97475c8ae8161a79af0893e850d7b9ca1fe7ea44e457b2069cb4e006f38ac546afef6a07490f5e7a393f314563d8a646341056e52962108c533b52788b95643711944300a82f8d41403a3bb069af52a78d608d65686f49a03632640aefddff0474a14070edc3f26044ec9fe05e90c06f68595c0653a4c002cf3d50c944f121ca4c3d9de6aa27ebe9908faca5c87f44a45ff30c84acc2c6a4d8cc86b76c6d7e7d601060e33212d0aff3fc14799c00b55fcb3ff48d29f44dd3222ee94494386868e11504b6e866984c3aaed6209dfbe03563c5c4835c55d2e", 0xe9, 0x5}, {&(0x7f0000001640)="c0c0a3ec3ad00027ce4650f8151d3a9ca5cf7423fa71f07b5ba59c23234183bb9b05dba0b0a988648bdc6abef11ebdac99b5aed7e7de372a7ed2d9c151f05bf6033577c742a1318ba5cb47f903436daa3e300f55f4aa824946d5f42656edca6f1e6374", 0x63}, {&(0x7f00000016c0)="a0ab55ef63ce3b4dd6fc9fb10903eeee5d1cfbc1f6864b2701ba05d92e1865eb74d39172d7e9a0aa4926b383cff3c613965eaac1c9f4321e3aa4bbd26424f6bf78d956c7e16e97b47fe63faa7d5654589072b4eb7734baf94016a5b890f6796546ef7651cb976e40a0c6b882323bc1a29bf72d35430cb7a9f11acd59330bdd6532225ce0f75f37bbf842b5", 0x8b, 0x4}, {&(0x7f0000001780)="2ed399f059427ed32f229ec01374a25940c47b65495071ae1a2621372d4538f16821a99901599ba16fdaf5161c080e4b512d206c8c80ce53b20b41a9a5d25bd4b7daa6349d39a70b0cd476617eb37b7f7ed854ed4a49e6a8066cddc6660c0253710922679b0487d1ba8cd0324b62fa4824c8d53ddc83f02c7fcec90ca9571c9fec97c0be3c33fe1eb6494ab3ca0229fd080a24326d804f453639a3c862104dbea8b035a605b9352221f63116e2fa9200eaa5ef49", 0xb4, 0x100000001}], 0x4000, &(0x7f0000001900)={[{@session={'session', 0x3d, 0x5f}}, {@gid={'gid', 0x3d, r4}}, {@session={'session', 0x3d, 0xf752620}}, {@barrier='barrier'}, {@nobarrier='nobarrier'}, {@gid={'gid', 0x3d, r11}}, {@umask={'umask'}}, {@nls={'nls', 0x3d, 'maccroatian'}}], [{@dont_appraise='dont_appraise'}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001380)={{{@in=@multicast2, @in6=@remote}}, {{@in=@loopback}, 0x0, @in6}}, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') readv(0xffffffffffffffff, &(0x7f0000002340)=[{0x0}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000580), 0x3c1) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b7000000000000009500000000000000f66500cb45c80ead8c0c8cca2a774ff3b55f4fe05df81d065fad96a333ca4607858d08121480fc9edb1d8b29f3f88a52a8a764f4770e21d71814cc3759f3e1962ff9cd1976610562f43511dee70707000000a17646b602604a12a934526812c3c311ef0840162414066d088fedeb30fc09ae51e3e3fa15cba98120d2490be62b70bb7d7303287c618c89a8350f6b249e5e99f91fa82dcd9407de9a6278eb5d724727654ab6982b3c9c2348198f5ae7d493ed4d6a0d9974515be84170bd3282bfd445021f0ea58077b39990724aa75726"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5b, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012"}, 0x40) 14:38:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5b, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012"}, 0x40) [ 195.632129] hfsplus: unable to parse mount options 14:38:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:19 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x230000, 0x80) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x44, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}]}]}, 0x44}}, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x80c80, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r7, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r7, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) dup3(0xffffffffffffffff, r7, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) lseek(r0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000400)={r9, @in={{0x2, 0x4e22, @remote}}, 0x80000001, 0x0, 0x0, 0xfffffffa, 0x80}, 0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000380)={r9, @in6={{0xa, 0x4e21, 0x7a6, @rand_addr="d74364fdf9c98eb22aba2e8343260823", 0xffffffff}}, 0x0, 0x9, 0x2, 0x2, 0x10}, &(0x7f0000000440)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000480)={r10, 0x2}, 0x8) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x5c, r4, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xf2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1be}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x60}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004110}, 0x40) r11 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r11, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x6, @ANYBLOB="280012000c000100697036746e6c00001800020014000300fe880000fbff00000000000000000001"], 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x6, 0x4) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5b, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012"}, 0x40) 14:38:19 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 195.761692] IPVS: Unknown mcast interface: teql0 14:38:19 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3", 0x0}, 0x40) 14:38:19 executing program 1: r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x4065e48b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000000), 0x9a895fdc07a6cf, 0x20000815) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020003) 14:38:19 executing program 4: prctl$PR_MCE_KILL(0x35, 0x0, 0x4) clone(0x20007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r0}, &(0x7f0000044000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='attr/fscreate\x00') exit(0x0) read$FUSE(r2, 0x0, 0x0) 14:38:19 executing program 1: r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3", 0x0}, 0x40) 14:38:19 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) ptrace$getsig(0x4202, r0, 0x1000, &(0x7f00000001c0)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x800, 0x0) ioctl$USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, &(0x7f0000000140)=0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000300)={{0x0, 0x0, @identifier="b1bd7fa46e3536e7c83802adc05f57f2"}}) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20, 0x4065e48b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000000000), 0x9a895fdc07a6cf, 0x20000815) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8020003) 14:38:20 executing program 1: r0 = socket(0x0, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x75, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x5c, 0x0, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3", 0x0}, 0x40) 14:38:20 executing program 4: pipe(&(0x7f00000012c0)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000004640)=""/4096, 0xb2e5720f77506b66) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001300)='/dev/kvm\x00', 0x200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f0000000140)={0x32, @broadcast, 0x4e22, 0x2, 'lblc\x00', 0x1a, 0x2, 0x55}, 0x2c) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x88101) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000100)) ioctl$int_in(r4, 0x800060c0045006, &(0x7f0000000040)=0x100000035) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000c0}, 0xc, &(0x7f0000000340)={&(0x7f0000001200)=ANY=[@ANYBLOB="001f00000f0a26d0fa1bffadf3eaa512840e76f350c617115bb6942f9c69dff752589d0ed3758bfce8bfce7e9c8e7164912416cb07f6324e4a7ca72986246c98178c7f870bde25e75bf48f243650da6c880df35e9155b0eb0ba1b53294", @ANYRES16=0x0, @ANYBLOB="000828bd7000fddbdf250e0000000800050002000000"], 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x20000000) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x80040, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, 0x0, &(0x7f00000001c0)) write(r2, &(0x7f0000003280)="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", 0x1000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001340)={0x0, @multicast2, @initdev}, &(0x7f0000001380)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) recvmmsg(r7, &(0x7f0000002800)=[{{&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000003c0)=""/209, 0xd1}, {&(0x7f00000004c0)=""/249, 0xf9}, {&(0x7f00000005c0)=""/239, 0xef}, {&(0x7f00000006c0)=""/118, 0x76}], 0x4, &(0x7f0000000740)=""/83, 0x53}, 0xffe00000}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000007c0)=""/85, 0x55}, {&(0x7f0000000840)=""/141, 0x8d}, {&(0x7f0000001540)=""/4096, 0x1000}], 0x3, &(0x7f0000000940)=""/70, 0x46}, 0xffffff83}, {{&(0x7f00000009c0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/222, 0xde}, {&(0x7f0000000b40)=""/191, 0xbf}, {&(0x7f0000005640)=""/4096, 0x1000}, {&(0x7f0000000c00)=""/155, 0x9b}, {&(0x7f0000000cc0)=""/95, 0x5f}, {&(0x7f0000000d40)=""/92, 0x5c}, {&(0x7f0000000dc0)=""/77, 0x4d}, {&(0x7f0000000e40)=""/154, 0x9a}, {&(0x7f0000000f00)=""/41, 0x29}, {&(0x7f0000000f40)=""/135, 0x87}], 0xa, &(0x7f00000010c0)=""/250, 0xfa}, 0x4}, {{&(0x7f00000013c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000002540)=""/176, 0xb0}, {&(0x7f0000002600)=""/206, 0xce}, {&(0x7f0000002700)=""/235, 0xeb}], 0x3, &(0x7f0000006640)=""/4096, 0x1000}, 0x6}], 0x4, 0x0, &(0x7f0000001280)) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000002940)={0x0, @broadcast, @remote}, &(0x7f0000000200)=0x1013c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000002d80)) [ 196.552060] IPVS: Unknown mcast interface: teql0 14:38:20 executing program 1: r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 5 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0x1000000, &(0x7f0000000140)="a673f3ce05f1a282eeab050000000100810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 14:38:20 executing program 2: r0 = socket(0x1e, 0x1, 0x0) accept4$unix(r0, &(0x7f0000000140), &(0x7f0000000040)=0x6e, 0x800) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000100)=0x7) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) 14:38:20 executing program 1: r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 3: open(0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000003500)=[{&(0x7f00000000c0)="e9457323beb3f54e9faea33a9f4de8723eec338097fdbe609799d037b552d64c334b1c411f94ae985f94a205f3531da33568f5be85b64469dc00034efe4c761ec63e548faedc914e7db1d3b8b97090b07c042af0b1ad74e66d59df13443ae32420bcd84e748733f3ab3fd54e2f4b83a2ace892d6a80e71d8b0eda455a57769b95d749c1a430ab7abd440aa7a4f1e20174b210883b7fb4845105124b6c5f7b8e75dae4f2fb3e9a1f3c7d1cca796c576fdbf54dbe973c5c63b58ae7b31be0ff8c914debe1c79f1c54684c30ba5c5d16736863348221ebcd1def93e7dfcd653bd4aab5c178790b0fd5a", 0xe8, 0x3c}, {&(0x7f00000001c0)="304fe2046ee3ee35d7b5b1b117900d1d9ab6f76aed3f522f0b7e7a6336b7ca14069a1f1637fe5ac7921df8ae3823909ba745274b3526dcb07c6e09d806f9afcbdc1a7962decb16a0a3954e70adeedcc09715cba920c097d9304ac31aa90cc79d416469a794c04b04918a3f8231f48d97f3616822525b341a038b2b44dc", 0x7d, 0xf3}, {&(0x7f00000002c0)="b561c6ffcac45a57822dd47edbb1faccd4e2c58f37d4275ae9ea2504398101670f3d9d58e879797ec0141372a3ad90c19192903250ac5f9d35124f1341e372d8239a6c423ffba4e9b7268dad4b590e5c5dabdc1a405b133e0b1939a44df6df22c8d04b8b3feda8b4784d0c1c293039bd11aaeddafc647295a06f642a295c41b42be26945ea4ae6ff377df379db2807f09befcb04b6bc06dbcb040da393d865d6c3c3155b912ef3ef62fa91b7f5be52ba7b", 0xb1, 0x9}, {&(0x7f0000001400)="8e7b932e1c6364f8539de0c7e54883acbfc7a79ec759a285568f09cb6301b7487a82b9ad25a030c88e3f369ac317e491f60d1164221d9de360faa8cc2a8d6ba33279cb73f866e0b2f3ceeb3a407d1b28090a62d2a2c5f2a8114a03cbf31ee1fe8ceb23920391f564a8d4e6148d834b4621273eb4b2151250e5c0115512590929fbc43f03245021772eea72a4778a9083bdf2eb9e88c8176683636fbb718b7f46969fb864565acbe60c4a4f31c0b7c5cd9b80b653e758ae8af7097ac5da5e0dc0009a5690d425787fce63cfa4a0f41c59f24fbf94dd12fd357cfcaf10dcafc0e4be8b59dc", 0xe4, 0x400}, {&(0x7f0000001500)="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", 0x1000, 0x2}, {&(0x7f0000002500)="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", 0x1000, 0x5}], 0x0, &(0x7f0000000240)={[{@umask={'umask', 0x3d, 0xffff}}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$reject(0x13, r1, 0x0, 0x3, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r1, 0x6e, 0xc0}, 0x0, &(0x7f0000000400)="55a5c7e5494c032c309393a29b4e2dcd161dbbf8fb4daae85fd9b4ad253c4b90c888929e709e3bcf9e5f1fe2af6241a68ee3bc34e7b3dddfbcb2d2ce343bc71cdf9cd509114069408b366c2f159075ac948794f478a9e2552d203eaf8b874d1ef1bffcf7ef83f84601cda6623cf7", &(0x7f0000000580)=""/192) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={r1, 0xb7, 0x67}, &(0x7f0000003640)=ANY=[@ANYBLOB="656e633d6f61657020686173683d636d6163286165732d61060000000000000000000015c6b9000000000000000000000000000000000000000000000000000000010000000000000000000000009c3d3623f76045c372824365d483a6670a402c5206573ae9d3f4e9ed13eb669be9df4012fa2dfc9eda7767e7db73536efc720e63d146d83dfba04782e8cd24893bfec235"], &(0x7f00000003c0)="5cece6aa2b79eb3d5d10821c22dcdc067fd58b5008a416939a76ac1e0bbb9e3c38bdce6a2deb40b26f013e092dd7f72796a1f095e594f1d5c2ea5a545195208d07eb10e2efcf7089d446e2f8b83f76803ec2818cdacf135ba66af1777dc5d97aadfb87379caca155fc7da2cd6d47411d1f7931d599f3979dba078e6b77e33550022190ae753c41981d596a2717b89e4ca3d281da11e798806a25c9c3b7a5e100844521d8bc9328ffac3806b9e7c2726fb7cc96c03ad1a3", &(0x7f0000000300)=""/103) r2 = request_key(&(0x7f0000000380)='blacklist\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f00000035c0)='\\+\x00', r1) keyctl$get_security(0x11, r2, &(0x7f0000003600)=""/54, 0x36) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) [ 196.744872] FAULT_INJECTION: forcing a failure. [ 196.744872] name failslab, interval 1, probability 0, space 0, times 0 14:38:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), 0x4) 14:38:20 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 196.821858] CPU: 0 PID: 8793 Comm: syz-executor.5 Not tainted 4.14.146 #0 [ 196.828850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.838219] Call Trace: [ 196.840828] dump_stack+0x138/0x197 [ 196.844477] should_fail.cold+0x10f/0x159 [ 196.848649] should_failslab+0xdb/0x130 [ 196.852645] __kmalloc+0x2f0/0x7a0 [ 196.856211] ? lock_downgrade+0x6e0/0x6e0 [ 196.860377] ? bpf_test_init.isra.0+0x7c/0xe0 [ 196.864895] bpf_test_init.isra.0+0x7c/0xe0 [ 196.869247] bpf_prog_test_run_skb+0xe5/0x9a0 [ 196.873769] ? __fget_light+0x172/0x1f0 [ 196.877760] ? bpf_test_init.isra.0+0xe0/0xe0 [ 196.882273] ? fput+0xd4/0x150 [ 196.885484] ? __bpf_prog_get+0x153/0x1a0 [ 196.889646] SyS_bpf+0x6ad/0x2da8 [ 196.893116] ? bpf_test_init.isra.0+0xe0/0xe0 [ 196.897615] ? bpf_prog_get+0x20/0x20 [ 196.897629] ? wait_for_completion+0x420/0x420 [ 196.897639] ? __sb_end_write+0xc1/0x100 [ 196.897652] ? fput+0xd4/0x150 [ 196.897661] ? SyS_write+0x15e/0x230 [ 196.897672] ? bpf_prog_get+0x20/0x20 [ 196.897682] do_syscall_64+0x1e8/0x640 [ 196.897689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.897704] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.917112] RIP: 0033:0x459a29 [ 196.917117] RSP: 002b:00007fea595e1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 196.917128] RAX: ffffffffffffffda RBX: 00007fea595e1c90 RCX: 0000000000459a29 [ 196.917134] RDX: 0000000000000028 RSI: 0000000020000400 RDI: 000000000000000a [ 196.917140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 14:38:20 executing program 1: r0 = socket(0x1e, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) [ 196.917145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fea595e26d4 [ 196.917150] R13: 00000000004bfd97 R14: 00000000004d1e70 R15: 0000000000000004 14:38:20 executing program 1: r0 = socket(0x1e, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) 14:38:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00RT\xdf`\x88\xd2sw\x00k\x9dY\x1a\xe2Hn\xefZ\x00\x04\x83}\xdd\xec\b\xa2\xa6\x89zf\xf7\x06\x03\xb4J\xcfW\x89y\x89\x96\xde\xf8\xd9\xb1\x01\x9e\x9ex!$\xb9\xbb\x9e\xe8\x87w\xc8\'\x90\\\b\xcf\x96\xc6\x01[\x01\x8fB\xa7$\xde\x00\x9c\xd8\x15\xc3\xd3\xb8\xd0\f\x9cA\xee\x10\xcc\xc6\x0eh\bq\xa3rm\x1e\xbb\x7fU\xc6r\xb2\x84Z\xc5\xce=\xaa\xc2u\x95\x89;\xcf\x13\xf2\xf6\x97\x00'/135) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESOCT=0x0]], 0x3}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, r4, 0x104, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0xffffffffffffff7c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0xfffffffffffffdeb, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x20080}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000100)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x4a, &(0x7f0000000380)=0x202, 0x4) write$P9_RLERRORu(r1, &(0x7f00000001c0)={0x1d, 0x7, 0x1, {{0x10, '/selinux/status\x00'}, 0xffff}}, 0x1d) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) bind$x25(r5, &(0x7f0000000180)={0x9, @null=' \x00'}, 0xfffffffffffffec2) [ 197.148442] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: tipc_subscrp_timeout+0x0/0x280 [ 197.160130] ------------[ cut here ]------------ [ 197.164890] WARNING: CPU: 1 PID: 5 at lib/debugobjects.c:287 debug_print_object.cold+0xa7/0xdb [ 197.173620] Kernel panic - not syncing: panic_on_warn set ... [ 197.173620] [ 197.180966] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.146 #0 [ 197.187439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.196787] Workqueue: tipc_send tipc_send_work [ 197.201438] Call Trace: [ 197.204012] dump_stack+0x138/0x197 [ 197.207626] panic+0x1f2/0x426 [ 197.210801] ? add_taint.cold+0x16/0x16 [ 197.214760] ? debug_print_object.cold+0xa7/0xdb [ 197.219501] ? debug_print_object.cold+0xa7/0xdb [ 197.224239] __warn.cold+0x2f/0x36 [ 197.227763] ? ist_end_non_atomic+0x10/0x10 [ 197.232067] ? debug_print_object.cold+0xa7/0xdb [ 197.236807] report_bug+0x216/0x254 [ 197.240418] do_error_trap+0x1bb/0x310 [ 197.244289] ? math_error+0x360/0x360 [ 197.248076] ? vprintk_emit+0x171/0x600 [ 197.252049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.256876] do_invalid_op+0x1b/0x20 [ 197.260571] invalid_op+0x1b/0x40 [ 197.264009] RIP: 0010:debug_print_object.cold+0xa7/0xdb [ 197.269351] RSP: 0018:ffff8880a9cd79d8 EFLAGS: 00010286 [ 197.274697] RAX: 000000000000006f RBX: 0000000000000005 RCX: 0000000000000000 [ 197.281949] RDX: 0000000000000000 RSI: ffffffff866d10e0 RDI: ffffed101539af31 [ 197.289212] RBP: ffff8880a9cd7a00 R08: 000000000000006f R09: ffff8880a9cc2a30 [ 197.296466] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff866cc2e0 [ 197.303722] R13: ffffffff85e6b790 R14: 0000000000000000 R15: ffff8880923cb018 [ 197.310980] ? tipc_subscrb_rcv_cb+0xa80/0xa80 [ 197.315557] ? debug_print_object.cold+0xa7/0xdb [ 197.320294] debug_object_assert_init+0x22f/0x300 [ 197.325122] ? debug_object_init_on_stack+0x20/0x20 [ 197.330127] del_timer+0x67/0xf0 [ 197.333478] ? trigger_dyntick_cpu.isra.0+0x190/0x190 [ 197.338656] tipc_subscrb_subscrp_delete+0x16a/0x3a0 [ 197.343743] ? trace_hardirqs_on_caller+0x400/0x590 [ 197.348744] ? tipc_subscrb_subscrp_delete+0x3a0/0x3a0 [ 197.354006] tipc_subscrb_release_cb+0x18/0x30 [ 197.358575] tipc_close_conn+0x176/0x210 [ 197.362619] tipc_send_work+0x470/0x5a0 [ 197.366583] ? tipc_close_conn+0x210/0x210 [ 197.370806] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.376245] process_one_work+0x863/0x1600 [ 197.380467] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 197.385124] worker_thread+0x5d9/0x1050 [ 197.389088] kthread+0x319/0x430 [ 197.392437] ? process_one_work+0x1600/0x1600 [ 197.396913] ? kthread_create_on_node+0xd0/0xd0 [ 197.401569] ret_from_fork+0x24/0x30 [ 197.406921] Kernel Offset: disabled [ 197.410623] Rebooting in 86400 seconds..