(r3, 0x40084504, &(0x7f0000000040)=[0xf7, 0x6]) r4 = dup2(r2, r0) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000150030000001000000010000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 08:28:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xfffffffffffffff8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000080)={0x37, &(0x7f0000000040)="302b7355d2d6a5ab203edd36f137a5d1369491fd67615821fc8ca0f579a44b422af36de029cd49f1c7483c9473a7a66e276ff5604bad40"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 198.315266] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 634 (only 16 groups) 08:28:49 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40042, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x3, 0x40}) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x0, [], [{0x3, 0x1319, 0x1, 0xaca, 0x6, 0x1}, {0xa0, 0xffffffffffff8001, 0x9, 0x3c, 0x9, 0xffff}], [[], [], [], [], []]}) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1f, 0x80000) 08:28:49 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000380)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x100000001, 0x1ff, 0xa1, &(0x7f0000000180)="de327bb07856836f191b0c4523b749df4bf188cb62f726d9e14954201be2524003dd26c58e9b1d1b01838c1d6bf5f7ebec4d921cab4f0c47b4875b2122437f9ac5b5219c8330710a51dd7bf81af9a76580b389d0c0c16b072e7d95cc32d473c71f975a005e3d6b322f379045158465fc4361bde62cad77999286ad1c629b4d9bb92fc719fbc9751ebfb4c4900b397fddfcc1efa71b60bdcfdaf5db25ed76265bd4"}) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='./file1/file0\x00') ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/104) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000280)='9p\x00', 0x0, 0x0) unlink(&(0x7f0000000080)='./file1/file0\x00') [ 198.434599] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 634 (only 16 groups) [ 199.032922] audit: type=1804 audit(1562056130.302:62): pid=8331 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir712442260/syzkaller.8iOnPq/46/file0" dev="sda1" ino=16690 res=1 08:28:50 executing program 5: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a64629773645f6574635f743a7330200973797374656d5f753a73797374656f5f723a6b65726ed7819af8858fa101d362b875656c5f743a7330203030303030303030303030303030303234353736202e2f66696c653000"], 0x5c) 08:28:50 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x1d1100) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'veth1_to_hsr\x00'}) shutdown(r0, 0x1) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, {0x0, 0x100000001, 0xfffffffffffffffd, 0x49b6, 0x400, 0x448}}, 0x8) 08:28:50 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0x61, 0x0, 0x0, 0x0, 0x13, 0x1d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x1e1e3ac5, [0xebff, 0x8, 0x40, 0x101, 0x20, 0x2, 0x6]}, &(0x7f0000000080)=0x16) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000240)=@gcm_128={{0x307}, "a78f243b91a829a5", "8fdac1a1c5172b9fee98328f2e6826ea", "6883af2d", "2fe97984b7ecb793"}, 0x28) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x7e}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={r1, 0x7, 0x2, 0x800, 0x8, 0x0, 0x9, 0x4, {r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}}, 0x10001, 0x80000001, 0xdeb, 0x9, 0x1000}}, &(0x7f0000000200)=0xb0) 08:28:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000340)={0x8, "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", 0x1000}, 0x1006) setgroups(0x3e3, &(0x7f0000000000)) write$P9_RLOPEN(r0, &(0x7f0000000000)={0x18, 0xd, 0x2, {{0x0, 0x0, 0x7}, 0x1}}, 0x18) pread64(r0, 0x0, 0x0, 0x0) 08:28:50 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2, 0x0, 0x47}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = dup(r0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000140)=0x400000000000, 0x4) ptrace$cont(0x1f, r1, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x80000) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000fec000/0x14000)=nil, 0x14000}, 0x1}) 08:28:50 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x100005c832, 0xffffffffffffffff, 0x0) clone(0x101000, 0x0, 0x0, 0x0, 0x0) 08:28:50 executing program 4: r0 = socket$kcm(0x10, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000007c0)="230000005e0081aee4050c00250b38fdc0b3140d09dd441f8b2e1a5020a759643dbed9", 0x23}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/104, 0x68}, {&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000380)=""/65, 0x41}, {&(0x7f0000000400)=""/101, 0x65}, {&(0x7f0000000480)=""/154, 0x9a}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000540)=""/161, 0xa1}], 0x7}, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 08:28:50 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) clock_gettime(0x7, &(0x7f0000002940)) write$UHID_DESTROY(r0, &(0x7f0000000000), 0x4) 08:28:50 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x80) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xb456, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x1c85}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4800, 0x0) [ 199.404058] audit: type=1400 audit(1562056130.672:63): avc: denied { map } for pid=8367 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=30016 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 08:28:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") mknod(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000800)='./bus\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x1e, 0x0) 08:28:50 executing program 0: clock_gettime(0xfffffffff7fffffb, &(0x7f0000002940)) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000040)) [ 199.580631] SELinux: Context system_u:object_r:mount_exec_t is not valid (left unmapped). 08:28:51 executing program 3: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x90103) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x7ff, 0x0, 0xf86, 0x0, 0x3, 0x8000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x180, 0x0) fchownat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 08:28:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) 08:28:51 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xc000, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) memfd_create(&(0x7f0000000000)='/dev/kvm\x00', 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RLERROR(r0, &(0x7f0000000100)={0x15, 0x7, 0x2, {0xc, 'trusted{user'}}, 0x15) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0xfffffffffffffff9, 0x0, 0xff}) 08:28:51 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffff000, 0x408000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x8000}, &(0x7f0000000080)=0x8) clock_gettime(0x0, &(0x7f00000000c0)) init_module(&(0x7f0000000140)='&wlan0posix_acl_access{em0cgroupsecuritysecurityvboxnet0\x00', 0x39, &(0x7f0000000180)='vboxnet1\\keyring#nodev\x00') ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000001c0)=[0x100, 0x1]) 08:28:51 executing program 4: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='system.posix_acl_default\x00', &(0x7f00002e7fec)='\x02\x00\x00\x00 \x00\x00\x00\x00\xfe\xff\x00\x01\x00\x00\x80\x8c\x00\x00\x00', 0x14, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2881, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 199.799617] FAT-fs (loop2): bogus number of reserved sectors [ 199.812501] FAT-fs (loop2): Can't find a valid FAT filesystem [ 199.894783] FAT-fs (loop2): bogus number of reserved sectors [ 199.900795] FAT-fs (loop2): Can't find a valid FAT filesystem 08:28:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x802, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x3, 0x4) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c00000031000103000000000000080000000000000001001400010000000c0001006373756d000000000000"], 0x2c}}, 0x0) 08:28:53 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x5], 0x1, 0xe846, 0x80000001, 0x7, 0x2, 0x401, {0x7, 0x9, 0x1, 0x3, 0x40, 0x1000000, 0xa00000, 0x7fffffff, 0x0, 0xff, 0x6, 0xd61, 0x8000, 0x1, "ef96cb41021ea69e01a90f5c02b74c82345a4bf4b04fbdb31ba4e6d82779c5b9"}}) 08:28:53 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000000)={0x100000001, 0x3, 0x7, 0x0, 0x5, 0x9}) setsockopt$inet6_int(r1, 0x29, 0x2, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) io_setup(0x3, &(0x7f0000000240)=0x0) io_submit(r5, 0x8, &(0x7f0000000940)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x5, r2, &(0x7f0000000280)="85ef2f85b6e8366ccc8032119ba15e5edb96247a0ccdb51fb7a7b1a1d98166b2a70b291e446cc8b021794768b79f399f60218c465547d7b55c4bd3f0a5b656f92bb277abbd19679d1377934d9511e5bc1721f9df62485fa0aa0706c83c578c38ef9fbb28e44f2328ed7abea8b237d25f883b9ee64abe1cb2ddf15600643f2a795fc9b414b449367e17c96cea93ad2a445a41", 0x92, 0x2, 0x0, 0x2, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0x8, r1, &(0x7f0000000380)="602ef9d104f7128635c1674743e0cb198dc3520d04bad39c19eb5127aa3d8f450a5e71f37ffad522f7d11821af8b2971395f783ca88c8540216bc5976c67a3999911e9cbe95d83bb43ab1556173018f1511f6eec7be634e0e3e4164092f5030ae9b39d4480ab9ca855d26c6441dcfdb1bdf862d6bf03477d72f3133670461c9be4141c794fb0619654fd1616c3af180e167ec3759677e7219e3e6f6a2b7a5c02a1fccad1", 0xa4, 0x6, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x615, r3, &(0x7f0000000480)="68916b977465240b88af70a72bcf46c80cc4a0e3b7d5b1be8215cbaf14fd5b3894a3ac0d8b1221f2385ced29f0ecff46c53482b2f46ef71d2434fc6a4fcb5e89f813b3795fe16a01459ecd16a8284b33af05726df6c7433b68eae5647b6a2174e7382eaac458cd0cc7dc370dabeea4ef301b78b5d23de329772d852dd4fdb759b980224a47aee3d6d1582f09121994a420aebfa6554d33e176df233e67390b10e07de5add5437ad46e2e35cc832f18de0fda", 0xb2, 0x7fffffff, 0x0, 0x1, r3}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0xaa2, r0, &(0x7f0000000580)="b689c63cf635d08b5e86bb591fb18bea53d27f0756caaa0c44338a0de1f2d08281ba444938c8c195cffb224b358c31ee66079954bdb417121fd94719e1bd92b0b0043d164585d0182846656fa6ea980af62b8e8b0d0a550571656bf786ea0b4e6927f3af3569cba9833ad6a81768be13e5fb540fa1252afc38c1dc044e29b43c97c88309577c0447804d7b87d46f4eecbc2b127a212dbfea4aa3a5e3803e9b4de2f4fbd6e4d534c6cabad533fe30810175cd6dee02a518a2797ca0fc96c84b33dfd5ef0c314b4990dbff95bef4d219", 0xcf, 0x3, 0x0, 0x2, r3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x8, r2, &(0x7f00000006c0)="75223d80cd30f10b8555078c6a8bac3365650e", 0x13, 0x3ff, 0x0, 0x2, r3}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x6, r1, &(0x7f0000000740)="065feb3be0eb9f393794f6948f15022c57ed9f0b3526d6abf8d4092eee07ae6a4e17c7b1c74d8366f6e2fef6d90bff6066d36a439be7dbd75f", 0x39, 0x40e34b3, 0x0, 0x1, r3}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x6, 0x6, r2, &(0x7f00000007c0)="ccb58bc2f8f71a006175126c82dda0fb8e6ddf944cb0fded8f9206edab7250944394990f31a392dcd1fc36f96eff48ffde7723eaa9d9f416ed0f41c35eb7b6ba1cf832b234f5e4c48b1236a182f245db2af5a97bc592c03ff152cf196039034bc86ef94486778ce2a43d538842a2d140a63ad102dd4f4235b5a771f6cc00cfae02a53eb6369f6dd535fd838cba3f89638d1ee631", 0x94, 0x6, 0x0, 0x0, r3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x7, 0xe9, r1, &(0x7f00000008c0)="cd4da9b4dace1970ad6fce5216a3d045874c658a8d61e8e65530cad7a87c5a9b6d8b8fca99", 0x25, 0x80, 0x0, 0x2, r3}]) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') 08:28:53 executing program 5: syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x87c, 0x2a0080) r0 = memfd_create(&(0x7f00000000c0)='+#nodev\x00', 0x2) fcntl$addseals(r0, 0x409, 0x8) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000080000004c000000000000000200000000000000060f0000000000000500000000000000000000000000000000000000000000000000000000000000000000000500000005000000000000000800000000000000050000000000000054b700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffe300"/768]) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 08:28:53 executing program 1: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x4, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x3) syz_extract_tcp_res(&(0x7f0000000040), 0x3, 0x7) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x31b, @rand_addr="677e739d517716bbfa83c9f09012aa05", 0x800}}, 0x0, 0x3}, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f0000000640)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) semget(0xffffffffffffffff, 0x0, 0x200) syz_emit_ethernet(0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x0) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000140)) unshare(0x40000000) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r2, 0x8}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100), 0x0) 08:28:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000580)='security.capability\x00', &(0x7f00000005c0)=@v2={0x2000000, [{0xffffffffffffca97, 0x2}, {0x5, 0x9b5b}]}, 0x14, 0x3) r0 = socket(0x40000000015, 0x805, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) 08:28:54 executing program 0: clock_gettime(0x100000000000007, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100)={0x77359400}, 0x10) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) sendto$x25(r0, &(0x7f0000000140)="ce6afa2aec1c83fd78dff28f6f5e27a146ab8601c4d3179cdbad8f11034692734479b89923f440eaa5708e453b73c2f77dbeb670ccaaa3a3a491829ac6fb654273612af22e516f6b357ded197f6fe613574174654fecc4d5b62773a458c81011be7ce83c1e5ec3ddcdf2773f222c3d726d9ab2e613f50b6387878c420900ebede1d8fd18026d28da7742b250b60ec698edc88feda6c5d981597612395ceba06a313ba7", 0xa3, 0x40000, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0xfffffde5) [ 202.762486] audit: type=1400 audit(1562056134.032:64): avc: denied { map } for pid=8434 comm="syz-executor.5" path=2F6D656D66643A2B236E6F646576202864656C6574656429 dev="tmpfs" ino=31126 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 08:28:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000680)={0x1, 0xffff, 0xae, 0x8, 0x1, 0x6a0, 0x80000000, 0xffffffff}, &(0x7f00000006c0)={0x383c, 0x2, 0x2, 0x4, 0x8000, 0x9, 0x8, 0xbf9}, &(0x7f0000000700)={0x1, 0x2, 0x8, 0x10000, 0x0, 0x4, 0x2, 0xff}, &(0x7f0000000780)={r1, r2+30000000}, &(0x7f0000000800)={&(0x7f00000007c0)={0x6}, 0x8}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa0040, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000580)={@rand_addr="009166c8782d71398bcf6ee7b87c0c16", 0xbab9, 0x2, 0x2, 0xa, 0xfffffffffffffff9, 0x87}, &(0x7f00000005c0)=0x20) open$dir(&(0x7f0000000600)='./file0\x00', 0x400042, 0x0) sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000004c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="88030000", @ANYRES16=r4, @ANYBLOB="00032bbd7000fedbdf25080000009c00050008000100657468004400020008000300000000000800040080000000080001001f00000008000300400000000800040000100000080004008300000008000400040000000800010002000000080001006574680044000200080004000300000008000300010000000800020004000000080001000300000008000400faffffff0800020003000000080002000700000008000400040000005800010044000400200001000a004e2100000008ff01000000000000000000000000000106000000200002000a004e2200000008000000000000000000000000000000000800000008000300000000000800030004000000380005002c00020008000300547f8c5408000300000000000800020009000000080003000001000008000400a50000000800f0006962000018000600040002000800010002000000080001000600000044000600080001000600000008000100039000000800010000000000080001000000000008000100ff010000040002000400020004000200040002000800010008000000100004000c00010073797a30000000000c0006000400020004000200340105002c00020008000200cf90000008000300340a000008000300070000000800040007000000080002007f00000024000200080003000200000008000400ff0f000008000400060000000800040009000000240002000800030009000000080001000900000008000300ffffff7f08000300e10a00003c00020008000300030000000800020009000000080001000b00000008000400ffffff7f08000400000100000800010014000000080001001c0000002c00020008000300010400000800040000000000080004000400000008000300ff03000008000300020000004c000200080003007f000000080004000400000008000200ffffff7f08000400020000000800020001000000080001000900000008000300ffffff7f08000400ac000000080001000500000008000100657468009c0004000c00070008000200b30f00003400070008000300ffffff7f0800020000000000080001001e000000080004004dae000008000200c1ffffff08000100100000000c00070008000300440000002c00070008000200ff0f0000080002000100000008000300e1ffffff080004000200000008000200010000000c000100737975fe000000001400010062726f6164636173742d6c696e6b0000"], 0x3}, 0x1, 0x0, 0x0, 0x4004}, 0x800) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000640)=0xb51a, 0x4) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000540)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'hsr0\x00', @ifru_hwaddr=@link_local}) 08:28:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(0x0, &(0x7f0000000580)='security.capability\x00', &(0x7f00000005c0)=@v2={0x2000000, [{0xffffffffffffca97, 0x2}, {0x5, 0x9b5b}]}, 0x14, 0x3) r0 = socket(0x40000000015, 0x805, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) [ 202.814796] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 202.835861] IPVS: ftp: loaded support on port[0] = 21 [ 202.837478] tc_ctl_action: received NO action attribs 08:28:54 executing program 0: clock_gettime(0x40000003, &(0x7f0000002940)) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000140)={0x6, 0xd2c}) pause() setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000180), 0x4) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) clock_gettime(0x3, &(0x7f00000002c0)={0x0, 0x0}) utimensat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {r3, r4/1000+30000}}, 0x100) 08:28:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x01\x00\x00\x00>\xb1\xef\x1e\x12\x8e9(', 0x2}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000, 0x20) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0xf24, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004}, 0x44000) [ 202.938874] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 202.958991] tc_ctl_action: received NO action attribs [ 202.969160] vivid-003: ================= START STATUS ================= [ 202.986697] vivid-003: Test Pattern: 75% Colorbar 08:28:54 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0xa) mount(0x0, &(0x7f0000014ff8)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0x4a0, 0x9, 0x7, 0xa000000000000}, 0x8) r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) set_tid_address(&(0x7f00000004c0)) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) fchdir(r1) r2 = memfd_create(&(0x7f0000000180)='selinux/\x00', 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000140)=ANY=[], 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7d}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000340)={0x10001, 0x0, 0x301f, 0x9a, 0x80, {0x400, 0x6}, 0x1}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00') recvfrom$ax25(r4, &(0x7f00000001c0)=""/204, 0xcc, 0x40, 0x0, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x8, 0x12, r2, 0x0) pread64(r5, 0x0, 0x0, 0xa4) [ 203.013100] vivid-003: Fill Percentage of Frame: 100 [ 203.027135] vivid-003: Horizontal Movement: No Movement [ 203.034604] vivid-003: Vertical Movement: No Movement [ 203.044015] vivid-003: OSD Text Mode: All 08:28:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0c6c723d093a666900b0305ec67073c38cc007e1abc89749ddd6c98a89b04e578e0ce0c6f50fb7bae95960f19e2fc9967e6e36b85b07c517611f3b8dc6941884d476370a371b92d0fbf208f4d425c7df09991282dcd50f8f9c8a1f7965e12f1545f2a1d4d91743227fae91301df5722fb5e12334bdbfc160905075cd7f3736656591e1e41c5607479ade4ea1118b744ed5ddb5dd936af4ebb93c5a5ba7925f29cc643e8c18bca83c7d50b008b7c26f67e081ba13648505d6f5b6b57702"]) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000340)=""/74, 0x4a) [ 203.068895] vivid-003: Show Border: false [ 203.095010] vivid-003: Show Square: [ 203.108285] false [ 203.116784] vivid-003: Sensor Flipped Horizontally: false [ 203.127276] vivid-003: Sensor Flipped Vertically: false [ 203.133063] vivid-003: Insert SAV Code in Image: false [ 203.138653] vivid-003: Insert EAV Code in Image: false [ 203.142553] overlayfs: unrecognized mount option " lr= :fi" or missing value [ 203.144623] vivid-003: Reduced Framerate: [ 203.157932] false [ 203.168122] vivid-003: Enable Capture Cropping: true [ 203.179496] overlayfs: unrecognized mount option " lr= :fi" or missing value 08:28:54 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x800009, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$ax25(0xffffffffffffff9c, &(0x7f00000000c0)={{0x3, @null}, [@rose, @netrom, @rose, @bcast, @rose, @rose, @bcast, @null]}, &(0x7f0000000140)=0x48) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000180)=""/244, &(0x7f0000000280)=0xf4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x9) [ 203.197020] vivid-003: Enable Capture Composing: true [ 203.203602] vivid-003: Enable Capture Scaler: true [ 203.212711] vivid-003: Timestamp Source: End of Frame [ 203.218371] vivid-003: Colorspace: sRGB [ 203.223356] vivid-003: Transfer Function: Default [ 203.244837] vivid-003: Y'CbCr Encoding: Default [ 203.256792] vivid-003: HSV Encoding: Hue 0-179 [ 203.267466] vivid-003: Quantization: Default [ 203.276779] vivid-003: Apply Alpha To Red Only: false [ 203.287983] vivid-003: Standard Aspect Ratio: 4x3 [ 203.294274] vivid-003: DV Timings Signal Mode: Current DV Timings [ 203.300940] vivid-003: DV Timings: 640x480p59 inactive [ 203.306375] vivid-003: DV Timings Aspect Ratio: Source Width x Height [ 203.313195] vivid-003: Maximum EDID Blocks: 2 [ 203.318679] vivid-003: Limited RGB Range (16-235): false [ 203.329488] vivid-003: Rx RGB Quantization Range: Automatic [ 203.336286] tpg source WxH: 640x360 (Y'CbCr) [ 203.341685] tpg field: 1 [ 203.344532] tpg crop: 640x360@0x0 [ 203.348244] tpg compose: 640x360@0x0 [ 203.352327] tpg colorspace: 8 [ 203.355461] tpg transfer function: 0/0 [ 203.359351] tpg Y'CbCr encoding: 0/0 [ 203.365168] tpg HSV encoding: 128/0 [ 203.368839] tpg quantization: 0/0 [ 203.372351] tpg RGB range: 0/2 [ 203.375556] vivid-003: ================== END STATUS ================== [ 203.388811] vivid-003: ================= START STATUS ================= [ 203.399187] vivid-003: Test Pattern: 75% Colorbar [ 203.406594] vivid-003: Fill Percentage of Frame: 100 [ 203.411852] vivid-003: Horizontal Movement: No Movement [ 203.417277] vivid-003: Vertical Movement: No Movement [ 203.423446] vivid-003: OSD Text Mode: All [ 203.427627] vivid-003: Show Border: false [ 203.431871] vivid-003: Show Square: false [ 203.436037] vivid-003: Sensor Flipped Horizontally: false [ 203.441769] vivid-003: Sensor Flipped Vertically: false [ 203.447187] vivid-003: Insert SAV Code in Image: false [ 203.452869] vivid-003: Insert EAV Code in Image: false [ 203.458254] vivid-003: Reduced Framerate: false [ 203.463010] vivid-003: Enable Capture Cropping: true [ 203.468231] vivid-003: Enable Capture Composing: true [ 203.473528] vivid-003: Enable Capture Scaler: true [ 203.478512] vivid-003: Timestamp Source: End of Frame [ 203.483759] vivid-003: Colorspace: sRGB [ 203.487769] vivid-003: Transfer Function: Default [ 203.494667] vivid-003: Y'CbCr Encoding: Default [ 203.499462] vivid-003: HSV Encoding: Hue 0-179 [ 203.506644] vivid-003: Quantization: Default [ 203.515841] vivid-003: Apply Alpha To Red Only: false [ 203.521156] vivid-003: Standard Aspect Ratio: 4x3 [ 203.526015] vivid-003: DV Timings Signal Mode: Current DV Timings [ 203.532335] vivid-003: DV Timings: 640x480p59 inactive [ 203.537629] vivid-003: DV Timings Aspect Ratio: Source Width x Height [ 203.544275] vivid-003: Maximum EDID Blocks: 2 [ 203.548787] vivid-003: Limited RGB Range (16-235): false [ 203.554936] vivid-003: Rx RGB Quantization Range: Automatic [ 203.560724] tpg source WxH: 640x360 (Y'CbCr) [ 203.565131] tpg field: 1 [ 203.567785] tpg crop: 640x360@0x0 [ 203.571332] tpg compose: 640x360@0x0 [ 203.575049] tpg colorspace: 8 [ 203.578149] tpg transfer function: 0/0 [ 203.582109] tpg Y'CbCr encoding: 0/0 [ 203.585840] tpg HSV encoding: 128/0 [ 203.589479] tpg quantization: 0/0 [ 203.593005] tpg RGB range: 0/2 [ 203.596204] vivid-003: ================== END STATUS ================== 08:28:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r3 = memfd_create(&(0x7f00000005c0)='-\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='net/bnep\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x6, 0x3, 0x7, 0x9, 0x0, 0x1, 0x40000, 0x4, 0x2, 0x8, 0x9, 0x2a, 0x5, 0x9, 0x8, 0x1, 0x8001, 0xae00000, 0x89, 0x7, 0x1, 0x2, 0x1, 0x7, 0x3ea5, 0x1000, 0x5, 0xfffffffffffff800, 0x1ff, 0x3, 0x8000000000, 0x9, 0x9, 0x0, 0x6, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0xe8d, 0x6a}, 0x1, 0x9, 0x73, 0x1, 0x8, 0xffffffff7fffffff, 0x1f}) r5 = shmget$private(0x0, 0x1000, 0x408, &(0x7f0000fff000/0x1000)=nil) r6 = geteuid() fstat(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000240)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) r9 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r0, 0x0, 0x12, &(0x7f0000000380)='$posix_acl_access\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000480)={{0x6879, r6, r7, r8, r9, 0x22, 0xfffffffffffffffb}, 0x4, 0x10001, 0x8, 0xa0d5, r10, r11, 0x3}) pwritev(r3, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) write$FUSE_DIRENT(r2, &(0x7f0000000080)={0x50, 0xfffffffffffffffe, 0x3, [{0x1, 0x51, 0x8, 0x7fffffff, 'security'}, {0x6, 0x800, 0x2, 0x5, '/\xda'}]}, 0x50) sendfile(r1, r3, 0x0, 0x1ffe00) 08:28:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80800) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0xc0fcfac6395b35a9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1f, 0x1, 0x6, 0x0, 0x80, r1, 0x7ff, [], r2, r3, 0x4, 0x1}, 0x3c) r4 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f0000000080)={0x81}) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r5, 0x104, 0x6, 0x0, &(0x7f00000006c0)=0x368) [ 203.801084] IPVS: ftp: loaded support on port[0] = 21 08:28:55 executing program 1: open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffca1, 0x0) rmdir(&(0x7f0000000500)='./bus\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x1, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xd) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000004c0)) setsockopt$inet6_dccp_buf(r1, 0x21, 0x8e, &(0x7f0000000000)="47398611fa1af34775c53b4507b9ff81afbb6d012950b13e91d42f4e94471040bef0f6ac912ea17462a709d2eb5e14e49339a7541fb7c8f52eca4eae", 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x8000000000000001, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f00000000c0)=0x202, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r0}, 0x10) close(r1) 08:28:55 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x53}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) tkill(r0, 0x29) 08:28:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unshare(0x400) fchown(0xffffffffffffffff, 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x108, 0x1800) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x100) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:28:55 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x2000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r2 = dup(0xffffffffffffff9c) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) r5 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00032cbd7000fcdbdf25010000000c00080000080000000000002400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="010087815fd183835f189520b4d9e5aff65717869179c5179c4d0e2cc947d27fea59cc64f9652bffad79e9e50f24165e832eabc8c99a8553016bb000"/74, @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="0c00050020000000000000000c00030004000000000000000c00060003000000000000000c0003007f000000000000000800010000000000"], 0x7c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) read$eventfd(r6, &(0x7f0000000040), 0x8) 08:28:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="1400c17b", @ANYRES16=0x0, @ANYBLOB="0000000000000000000011000000"], 0x14}}, 0x0) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x4000000) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 08:28:55 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x2) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 08:28:55 executing program 0: 08:28:55 executing program 5: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000480)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, @initdev, @dev={0xfe, 0x80, [], 0x10}, 0xffff, 0x0, 0x7ff, 0x0, 0x0, 0x108}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$SIOCNRDECOBS(r1, 0x89e2) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$autofs(0xffffffffffffff9c, 0x0, 0x10800, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:28:55 executing program 2: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x3, {{0x43}}}, 0x10) bind(r0, &(0x7f0000670000)=@generic={0x1e, "01fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000100)={@ax25={{0x3, @null}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, {&(0x7f00000001c0)=""/60, 0x3c}, &(0x7f0000000200), 0x4e}, 0xa0) 08:28:55 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='net/packet\x00', 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000005374f83d6480ccb90300060000000000000000b7380000000000000000000000000020005f04"], 0x2e) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:28:55 executing program 1: open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0xfffffffffffffca1, 0x0) rmdir(&(0x7f0000000500)='./bus\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x1, 0x3, 0x4) r1 = socket$inet6(0xa, 0x3, 0x6) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xd) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000004c0)) setsockopt$inet6_dccp_buf(r1, 0x21, 0x8e, &(0x7f0000000000)="47398611fa1af34775c53b4507b9ff81afbb6d012950b13e91d42f4e94471040bef0f6ac912ea17462a709d2eb5e14e49339a7541fb7c8f52eca4eae", 0x3c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x8000000000000001, 0x3}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f00000000c0)=0x202, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7', r0}, 0x10) close(r1) 08:28:55 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unshare(0x400) fchown(0xffffffffffffffff, 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x108, 0x1800) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x100) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:28:55 executing program 0: pselect6(0x40, &(0x7f0000000040)={0x3, 0x3dd183a5, 0x4, 0xfffffffffffffff7, 0x4, 0x5, 0x0, 0x240000000}, &(0x7f0000000080)={0xffffffff, 0x2d7, 0x1, 0xffffffffffff0001, 0x2, 0x5, 0x1, 0x5}, &(0x7f00000000c0)={0x5, 0x2, 0x3, 0xa8e9, 0x1ff, 0x1, 0x1, 0x4}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={0x400}, 0x8}) clock_gettime(0x2000803, &(0x7f0000000000)) 08:28:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000000000000, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000080)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x80000) ioctl$KDSETMODE(r1, 0x4b3a, 0x9) r2 = getpgid(0x0) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f000045fff8)={0x0, 0x0}) kcmp(r2, r4, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 08:28:55 executing program 5: semctl$SETVAL(0x0, 0x0, 0x10, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000480)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, @initdev, @dev={0xfe, 0x80, [], 0x10}, 0xffff, 0x0, 0x7ff, 0x0, 0x0, 0x108}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$SIOCNRDECOBS(r1, 0x89e2) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) openat$autofs(0xffffffffffffff9c, 0x0, 0x10800, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) 08:28:55 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = open(0x0, 0x0, 0x1) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000280)) creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000340)=0x9, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000300)={r4, 0x80000, r2}) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x5, 0x9}, &(0x7f00000003c0)=0x10) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) 08:28:55 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1fd, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0xa0f}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r1, 0x80}, 0xc) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='trustedppp1\x00', 0xc, 0xacf92421ac62d44f) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000140)=0x5) 08:28:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001424, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x3, {0x5, 0x4, 0x8001, 0x269}}, 0x20) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xfff, 0x65, 0x5}) 08:28:55 executing program 4: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x102, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x1}, &(0x7f0000000140)=0x8) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000000) r4 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x20) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000300)="11dca5055e0bcfec7be070") 08:28:55 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x3, 0x4) 08:28:56 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x8000) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000000040)=0xd000) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='cubic\x00', 0x5) [ 204.704923] audit: type=1804 audit(1562056135.972:65): pid=8575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/52/bus" dev="sda1" ino=16742 res=1 08:28:56 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) fcntl$addseals(r0, 0x409, 0x8) [ 204.819056] audit: type=1804 audit(1562056135.972:66): pid=8575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/52/bus" dev="sda1" ino=16742 res=1 08:28:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@multicast1, @remote, @empty}, &(0x7f0000000240)=0xffffffffffffff7d) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) unshare(0x400) fchown(0xffffffffffffffff, 0x0, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x108, 0x1800) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x100) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000c80)=ANY=[], 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 08:28:56 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000280)=0xc) ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f00000002c0)={0xf, 0x80000000, 0x4, 0x800, 0xffffffffffffffff}) r2 = syz_open_dev$midi(&(0x7f0000000440)='/dev/midi#\x00', 0x5, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}, 0x117, 0x8}}, 0x20) r4 = syz_open_dev$media(&(0x7f0000000540)='/dev/media#\x00', 0xff, 0x20080) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000580)={0x12, 0x10, 0xfa00, {&(0x7f0000000480), r3, r4}}, 0x18) fadvise64(r1, 0xffffffffffffffff, 0x789, 0x8000000000) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x20000, 0x0) getpeername$unix(r5, &(0x7f0000000380), &(0x7f0000000400)=0x6e) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x5, 0x5, 0x2506, 0x0, 0x0, 0x9, 0x64080, 0x4, 0x0, 0x8, 0x7ff, 0x200, 0x8, 0x100, 0x0, 0xeb, 0xfffffffffffffffa, 0x81, 0x8815, 0x8, 0x8, 0x0, 0x0, 0x0, 0x80000000, 0x32aa4000, 0x7f, 0x1f, 0xe, 0x52c, 0x5, 0xb3, 0x9, 0x419, 0x97, 0x100000001, 0x0, 0xda, 0x3, @perf_config_ext={0xfffffffffffff6d4}, 0x20, 0xffffffffffffffff, 0x9, 0xd, 0xfffffffffffffffa, 0x3000000000000000, 0x8}, r0, 0xe, 0xffffffffffffff9c, 0x8) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000300)='./file0/file0\x00', 0x8) r6 = creat(&(0x7f0000000640)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x3a, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800000200000000, 0x2, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$UI_SET_MSCBIT(r6, 0x40045568, 0x18) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) connect$bt_l2cap(r6, &(0x7f0000000100)={0x1f, 0x0, {0x80, 0x100, 0x0, 0x6d, 0x5, 0x30000000000}, 0x4, 0xfffffffffffffffc}, 0xe) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, &(0x7f00000000c0)) [ 204.853177] audit: type=1400 audit(1562056136.002:67): avc: denied { name_bind } for pid=8571 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 08:28:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xba5, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x6) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() setresgid(r2, r3, r4) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) 08:28:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x3e7}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20200, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x3f) 08:28:56 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) clock_getres(0x0, &(0x7f0000000000)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$KDDISABIO(r0, 0x4b37) [ 205.004236] audit: type=1400 audit(1562056136.002:68): avc: denied { node_bind } for pid=8571 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 205.084759] audit: type=1804 audit(1562056136.042:69): pid=8575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/52/bus" dev="sda1" ino=16742 res=1 [ 205.120578] audit: type=1804 audit(1562056136.062:70): pid=8575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/52/bus" dev="sda1" ino=16742 res=1 [ 205.360160] protocol 88fb is buggy, dev hsr_slave_0 [ 205.365321] protocol 88fb is buggy, dev hsr_slave_1 [ 205.440742] protocol 88fb is buggy, dev hsr_slave_0 [ 205.451614] protocol 88fb is buggy, dev hsr_slave_1 08:28:56 executing program 2: socket$packet(0x11, 0x3, 0x300) r0 = open(0x0, 0x0, 0x1) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000280)) creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000340)=0x9, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000300)={r4, 0x80000, r2}) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={0x0, 0x5, 0x9}, &(0x7f00000003c0)=0x10) read(r3, &(0x7f0000000180)=""/19, 0xfffffe47) 08:28:56 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000004fc8)={0x0, 0x199, &(0x7f0000000000)={&(0x7f000002c000)=@mpls_newroute={0x1c, 0x18, 0x21}, 0x1c}}, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x20, 0x81, 0x5}) 08:28:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x29b, 0x0, 0x40009, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') 08:28:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x3e7}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20200, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x3f) 08:28:56 executing program 0: clock_gettime(0xfffffffff7fffff4, &(0x7f0000002940)) 08:28:56 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f0000000080)=""/10, &(0x7f00000000c0)=0xa) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, 0x0) syz_mount_image$nfs(&(0x7f0000000100)='nfs\x00', &(0x7f0000000140)='\x00', 0x7f, 0x1, &(0x7f0000001180)=[{&(0x7f0000000180)="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", 0x1000, 0xd}], 0x0, &(0x7f00000011c0)='-)\x00') 08:28:57 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000080)={r1, 0x2}) 08:28:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x8926, &(0x7f0000000040)=0x4) 08:28:57 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x7fffc, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6, @in6=@ipv4={[], [], @remote}}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000002c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r2, &(0x7f0000000040)=""/46, 0x2e) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) utime(&(0x7f0000000440)='./file0\x00', 0x0) r3 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000540)={0x3, 0xc9, "501e87b9d8d63fd40f5be556c85500bd5e666dfc31e31aad64696dd65db56384913f8a6aab36db9c1ab57e4ae7fb57e8db191273ad0e9c6d21370cf0e18dfc3e05528ef15c8662a7ce23008f33df2da219d84de347a22d73e6963b8296596c72bbeca09c06961ec844b3dec3ac57cc0fcbb43cdf19d628f12dac6b66146aaae0f3d0ac6acc54aa5de3c6fe60ea386df5c61f96d493f10366be3490a6191f425b974e482bbb68fc8af9170c1fc8d7d69a982063eb1fc1a512a65d5c2732f9fcf86ff94ef7f6581c5dd4"}) keyctl$read(0xb, r3, &(0x7f0000000140)=""/160, 0xa0) ioctl$RTC_WIE_ON(r1, 0x700f) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x34098, 0x2, 0x8, 0x8, 0x0, 0x3, 0x1, 0x0, 0x5, 0x0, 0x3, 0x1, 0x0, 0x0, 0x5f30, 0x7a, 0xfffffffffffffc01, 0x0, 0x64f9, 0x0, 0x0, 0xfffffffffffffff7, 0x7, 0x0, 0x401, 0x0, 0x9, 0x0, 0x100000001, 0x2, 0x0, 0x1, 0x4, @perf_config_ext={0x67b}, 0x108a8, 0x5, 0x460210dc, 0x0, 0x2, 0x100000001, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x2) [ 205.708735] audit: type=1804 audit(1562056136.972:71): pid=8629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/53/bus" dev="sda1" ino=16747 res=1 08:28:57 executing program 3: listen(0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)=0x5fff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) inotify_init1(0x80000) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000002c0)={"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"}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:28:57 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa00, 0x0) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000040)) [ 205.872904] audit: type=1804 audit(1562056136.972:72): pid=8629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/53/bus" dev="sda1" ino=16747 res=1 [ 205.914915] Unknown ioctl -2147202750 08:28:57 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x401) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0xe}, 0x5}}}, 0x84) [ 205.921530] protocol 88fb is buggy, dev hsr_slave_0 [ 205.926635] protocol 88fb is buggy, dev hsr_slave_1 [ 205.935394] sp0: Synchronizing with TNC [ 206.018806] audit: type=1804 audit(1562056136.972:73): pid=8629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/53/bus" dev="sda1" ino=16747 res=1 [ 206.148571] audit: type=1804 audit(1562056136.972:74): pid=8629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir037975186/syzkaller.GrlGao/53/bus" dev="sda1" ino=16747 res=1 [ 206.480157] protocol 88fb is buggy, dev hsr_slave_0 [ 206.485271] protocol 88fb is buggy, dev hsr_slave_1 08:28:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:28:57 executing program 5: syz_genetlink_get_family_id$tipc(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000040)={0x7, 0x2}) 08:28:57 executing program 0: clock_gettime(0x40000a, &(0x7f0000000080)) 08:28:57 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000080)={0x2, 0x400000000001, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) 08:28:57 executing program 1: clone(0x840001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = gettid() ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) wait4(r1, 0x0, 0x1, 0x0) prlimit64(r1, 0x7, &(0x7f0000000040)={0x4, 0x5}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x13) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0x4485, 0x8000, 0x9, 0x0, 0x9, 0x10, 0x4, 0x9, 0x2, 0x1, 0xfff, 0x1, 0x8, 0xf5, 0x0, 0x69da, 0x1, 0x7, 0x400, 0x7fffffff, 0x9, 0x7, 0xa5, 0x9, 0x0, 0x40000000000, 0x3f, 0x3ff, 0xffffffffffffff7f, 0x1, 0x0, 0x2, 0x7, 0x8, 0xff, 0x0, 0x6, 0x3, @perf_bp={&(0x7f00000003c0), 0x2}, 0x10000, 0xcf2, 0x18d, 0xb, 0x3, 0x9, 0x2}, r1, 0x3, r2, 0x3) ptrace$cont(0x18, r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8401000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x170, r3, 0x308, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa81}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}, @TIPC_NLA_NODE={0x44, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffe1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd41}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4e4d}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x83c}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x401}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x821}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4008850}, 0x4040004) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x3, 0x0, 0x0, 0x4, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 08:28:57 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x80000000001004, 0x1c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xa94b, 0xfff) ptrace$cont(0x9, r0, 0x0, 0x0) 08:28:57 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 08:28:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) recvmmsg(r1, &(0x7f0000001d00)=[{{0x0, 0xffffffffffffff8c, &(0x7f0000001c80)=[{&(0x7f0000001ac0)=""/116, 0x66}], 0x1, 0x0, 0x219}}], 0x4000000000002c9, 0x0, 0x0) 08:28:58 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000080)={0x2, 0x400000000001, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) 08:28:58 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000040)={0x24020019980330}, &(0x7f0000000140)) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setuid(0x0) setpriority(0x2, 0x0, 0x0) pivot_root(0x0, 0x0) clock_gettime(0x7ffffffffffffffb, &(0x7f0000000180)) socket$key(0xf, 0x3, 0x2) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) clock_gettime(0x0, &(0x7f0000000000)) 08:28:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) read$rfkill(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x106}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x8, 0x1}) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:28:58 executing program 3: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x7f, 0x2000) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000600)=0x80000001) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000580)) r3 = fcntl$dupfd(r2, 0x80000000406, 0xffffffffffffffff) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000001c0)=0x1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000480)={0x1f, 0x1, 'client0\x00', 0xffffffff80000000, "1e22a78fcb0b6b08", "3ca93ea6494f85f6cbc6bc7e0df6467967fe982a9a5017dfd5f1dcb5ca255cf6", 0x1, 0x7}) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000280)=""/10, &(0x7f0000000300)=0xa) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000380)=0xfffffffffffffdaa) splice(r2, &(0x7f0000000000), r1, &(0x7f0000000200), 0x8, 0xc) open(&(0x7f0000000240)='./bus\x00', 0x301003, 0x6) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000140)="fbdd8c9c2f2d992f5b16fa5f1bf0b079c73f6e524b05b4c5", 0x18) r5 = socket$inet6(0xa, 0x400000000001, 0x1) ioctl$sock_TIOCINQ(r5, 0x541b, &(0x7f0000000340)) r6 = semget(0x2, 0x3, 0x120) semctl$GETPID(r6, 0xfffffffffffffffd, 0xb, &(0x7f00000000c0)) r7 = dup(r5) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r5) r8 = shmget$private(0x0, 0x3000, 0x40001000, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_UNLOCK(r8, 0xc) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0xffffffffffffff01, 0x2000000c, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r9, 0x2007fff) sendfile(r7, r9, 0x0, 0x8000fffffffe) [ 206.844469] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 08:28:58 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x24002) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000240)={0x18, 0x0, {0x400003, @broadcast, 'batadv0\x00'}}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000200)={0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x4040, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)) 08:28:58 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000540)=0xff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000240)={0x0, 0x1000}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000300)='./file1\x00') memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r4, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) socket(0xa, 0x0, 0x3fe) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x2) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000006c0)=0xd1) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) write$FUSE_POLL(r2, &(0x7f0000000280)={0x18, 0x0, 0x2, {0x401}}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) readahead(r3, 0xfffffffffffffffc, 0x200) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, &(0x7f0000000380), 0x0}, 0x18) 08:28:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:28:58 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = dup(0xffffffffffffffff) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000000)=0x6) 08:29:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_nlink(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.nlink\x00', 0x0, 0xfffffffffffffde7, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) 08:29:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='stat\x00') socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) exit(0x0) sendfile(r2, r1, 0x0, 0x10000002) 08:29:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001080)="c0dca5055e0bcfec7be070") syz_emit_ethernet(0x10a, &(0x7f0000000000)={@broadcast, @local, [{[{0x9100, 0xfff, 0x2, 0x4}], {0x8100, 0x9a, 0x3ff, 0x3}}], {@generic={0xf8ff, "72a0709cd83eb142323485fd2cf8ab6d516089c4bb968410ce6b5cc4cf9b41aeeba0a928a044d2ddd9d5fe0806547ea7fd74c8b50606c434c591c10a5156726cfff1a28e850762eb73c3d9656a6afa335a84af65b863e4133c7a884b5e2974ebee8c85617a1511115b6913bf497a161e4750dfa208ac94f81340a06d0cdb0fbc7584250794eae4da468ce4238cbff98be94a2d113552aaec64440d8688063cef04dc7362a51ae520b772ec70f4740c75bb26b9a558f8009440884bbd2861528790e53d10dec38d1596291b1a60a137aed11a1df8a84b532c587639748a0b2fd7238cfca4ab65e358e680c6cd8809ddedf870029e"}}}, &(0x7f0000000140)={0x0, 0x2, [0xfe3, 0xdfc, 0xbed, 0xa58]}) syz_emit_ethernet(0x46, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60c22df700102100fe800000000000000000000000000000fe8000000000000078000087ae00ca8345bb1f2d787f08452e0f6aaa36270c34a21010fd8b025f1959419c5e112019b732c3d6f98fb5dfe71702e64b7cb7db890b31793e732ac21719e6fc5b05480d79595d9ed0459a6d3dedf2cfc126d3fe46a2246908b75c45aef0df0287a2c1bb9cf8b08c67e38cd48232756f1025beb5cc61388303a04c01d8ec72bd626530bb2a6ea6656a52d11d454d44451b20f53767f8b57c7c91c98e4f6fc96b5a9d46875dea12157f7f07e697df8e1abf1a45598693e286"], 0x0) 08:29:00 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000540)=0xff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000240)={0x0, 0x1000}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000300)='./file1\x00') memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r4, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) socket(0xa, 0x0, 0x3fe) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x2) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000006c0)=0xd1) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) write$FUSE_POLL(r2, &(0x7f0000000280)={0x18, 0x0, 0x2, {0x401}}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) readahead(r3, 0xfffffffffffffffc, 0x200) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, &(0x7f0000000380), 0x0}, 0x18) 08:29:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:00 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) 08:29:00 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x2) recvmmsg(r0, &(0x7f0000008f80)=[{{0x0, 0x0, 0x0}}], 0x20e, 0xfffffffffffffffd, 0x0) 08:29:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000003c0), 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) readlink(0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000580)={&(0x7f0000000380), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:29:00 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1000, 0x8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0xfffffffffffffef5, r1, 0x4, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xfffffffffffff061, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4004080}, 0x8000) clock_gettime(0xfffffffffffffff8, &(0x7f0000000000)) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) 08:29:01 executing program 1: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) 08:29:01 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000540)=0xff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000240)={0x0, 0x1000}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000300)='./file1\x00') memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r4, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) socket(0xa, 0x0, 0x3fe) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x2) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000006c0)=0xd1) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) write$FUSE_POLL(r2, &(0x7f0000000280)={0x18, 0x0, 0x2, {0x401}}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) readahead(r3, 0xfffffffffffffffc, 0x200) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, &(0x7f0000000380), 0x0}, 0x18) [ 209.696420] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 08:29:01 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffc, 0x400000000000080) r1 = getpgid(0xffffffffffffffff) write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x7, {{0xbabd, 0x10000, 0x0, r1}}}, 0x28) 08:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:01 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000800)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x7fffffff) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40485404, &(0x7f0000000180)={0x1}) r1 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x8000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f00000000c0)={0x8001005, 0x42, 0x3}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000240)={0x6, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000340)={r3, &(0x7f0000000280)=""/175}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000140)={r4, 0x1, 0x6, @dev={[], 0xb}}, 0x10) shmat(r1, &(0x7f0000ffc000/0x1000)=nil, 0x1000) 08:29:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={[{@nodiscard='nodiscard'}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={r1, 0x7fff, 0x100000000, 0x3ff, 0xd8ee, 0x3, 0x1}) 08:29:01 executing program 5: r0 = getpid() getpriority(0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x9, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000000540)=0xff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000140)="240000001e0025eaa87865f51ef6bce90a04000200bff20182a9000c080009000b000000", 0x24) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f0000000240)={0x0, 0x1000}) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e21, 0x3, 0x1}, 0x2c) unlink(&(0x7f0000000300)='./file1\x00') memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)) fsetxattr$security_smack_entry(r4, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) socket(0xa, 0x0, 0x3fe) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x2) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000006c0)=0xd1) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x1) write$FUSE_POLL(r2, &(0x7f0000000280)={0x18, 0x0, 0x2, {0x401}}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz0\x00', 0x1ff) readahead(r3, 0xfffffffffffffffc, 0x200) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x40000, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x2, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002111, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r5, &(0x7f0000000380), 0x0}, 0x18) 08:29:01 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000040)={0x7f, 0x101, @value}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 08:29:01 executing program 5: r0 = socket(0x10, 0x0, 0x0) unshare(0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) close(r1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000080)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null}) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {}, [], {}, [], {0x10, 0x2}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) 08:29:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f00000003c0), 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) readlink(0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000580)={&(0x7f0000000380), 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:29:01 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x102, 0x0) bind$llc(r0, &(0x7f0000000040), 0x10) getsockname$llc(r0, 0x0, &(0x7f0000000140)) 08:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) 08:29:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) sched_setaffinity(r4, 0x8, &(0x7f0000000200)=0x3) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) mq_timedreceive(r5, &(0x7f0000000680)=""/216, 0xd8, 0x1230, &(0x7f0000000280)) r6 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000580)={r4, r2, r3}, 0xc) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000100)) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RUNLINKAT(r5, &(0x7f00000002c0)={0x7, 0x4d, 0x2}, 0x7) ioctl$KVM_SET_SREGS(r7, 0x4138ae84, &(0x7f0000000300)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffd, 0x0, 0x0, 0x100a0}) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000240)={0x2, 0x9, 0xe2d, 0x20}, 0x8) ioctl$KVM_SET_SREGS(r7, 0xc018ae85, &(0x7f0000000440)={{0x1000}, {}, {}, {0x0, 0x0, 0xfffffffffffffffc}}) 08:29:01 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x2) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@null=' \x00', 0x4, 'bridge0\x00'}) 08:29:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000002c0)='em1{self{\xdf\x90.vboxnet1keyring\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f00000000c0)=0x4) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) write$P9_RLINK(r2, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) [ 210.463411] XFS (loop4): Invalid superblock magic number 08:29:01 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9074, 0x40) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) clock_gettime(0xfffffffffffffffa, &(0x7f0000002940)) 08:29:01 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KDDELIO(r0, 0x4b35, 0x6) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000a8d000)={&(0x7f0000c78ff4), 0xc, &(0x7f0000df6000)={&(0x7f0000b04cf4)=ANY=[@ANYBLOB="1c000020090afd81000400000000638b39e00c0008002100"], 0x1c}}, 0x0) vmsplice(r1, &(0x7f0000000540)=[{&(0x7f0000000100)="88", 0x1}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000000)=0x1) close(r1) ioctl$PPPIOCSFLAGS1(0xffffffffffffff9c, 0x40047459, &(0x7f0000000080)=0x8) 08:29:01 executing program 4: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/user\x00', 0x2, 0x0) r0 = socket(0x3, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x2, 0x180) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000200)={0x10000, 0x0, &(0x7f0000ffe000/0x1000)=nil}) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000000240)="1f0000000104ff40003b54c007040000f30501000b000200000000000100cf", 0x52) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="6d616e676c65000000ce6e02000000000000000000000000000000000000000000000086000000d34a320daeab078b3489a8f4c5f32ebec6024760ebbc098abf2a48b5a264eb7742c87b61f5f0b021a86cd792aa94c8f7a00afcc6aa24c5990c768e1b056a38252fb24154b1da7d7d99c9671c388ea96b337f4db4d3b9fa91c3c90a92cf59741d3eadf2db125d99d462128f5b2e193180a97ce89578"], &(0x7f0000000140)=0xaa) 08:29:01 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x45, 0x0, 0x0) 08:29:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2400000001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) getsockopt$inet6_buf(r1, 0x6, 0x1000000000001e, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0_to_hsr\x00', {0x2, 0x4e24, @multicast2}}) 08:29:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) 08:29:01 executing program 0: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) 08:29:02 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcf, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) 08:29:02 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f00000000c0)="d142310fe653d66fc3cb1b8e7c1f9b1afb2cdc096b14f1169253780c35b1eb620332c829b8f607c9d4458cf960bddd349a8f4a23cbcd531a1ce808289f0a60e45d06f7379d38a10a51e748f4ff913f4550d9aa6d7222232f0913a3b657731a5e72aae678cd12ea1d4e25d3512d67e50ca2af20f7ef94db1e54") 08:29:02 executing program 5: unshare(0x8000400) r0 = mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x8c2, 0x0, &(0x7f000004b000)={0xffffffffffffffff, 0x1, 0x3}) r1 = epoll_create1(0x0) r2 = getpgid(0xffffffffffffffff) fcntl$lock(r1, 0x0, &(0x7f0000000040)={0x0, 0x1, 0xffffffff, 0x4, r2}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000289000)) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 08:29:02 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0x0, 0x80000008, 0xef, 0xfffffffffffefffc, 0x13, 0x1000, 0x80, 0x6, 0x1, 0x3c6, 0xfffd, 0x100}) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000580)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000680)=0xe8) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f0000000440)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="7ca05a2afd7ccc1afbfc9560209611cec932b6dd9cb2b2b5285e0a835e663322ec9de6de29c41a0f2666ef0d0114c3adc2d865d5923934751caf0b24ec42832388e28841e763605bc7eb7ccf77e767d0d6e71a066c712c4a60837586277945faaa1c359451a7c7c102d8abb26a08a49ba0671d7fbdb3bfe6406735b3acc7db68ec02d7cd5ea616d4ebea2c48dd89b73f8c3bd9419581b397fb82bf720a8410d9495e", 0xa2, 0x100000001}, {&(0x7f0000000200)="4bb4789b9540c9ff54de527533fc4d273368fa68d945c8fcaccc6a7520dad28cfe815b64192d41c2cb8b4d3549af9987b97f8150c8e50e7bcea28afedd5914f481cdd9222021aa5405a0fe959b5a5d5c0444fe6e502f3dd18a8a8ba14e323930522b37912a2c6436e7459e4c7c50379bda8588e104386113842f2c5a68688a7079471ac4614dd0accad129ced2633b98a85ee151c07e5fd911f1379e090b475bc87e1783ac5d4b0edd2b6b569b9aa2b11ffd97adb77d5cdc78caf83042b2aab99c309bc1d470ed4528d7360451a473feee53618e753ee103689fe4038aeb0ae7fdff082ecaed", 0xe6, 0x1654}, {&(0x7f0000000300)='E', 0x1, 0x13}, {&(0x7f0000000340)="f656a05c0036287aa77a898e1984d184b78d6f70c8fbca7958c888e8a3b9cbc0f44927cd7fb0ea931a79b6ab8d9289a3048005111418abc0c153765c24e89876230f85f98f5f623884f7f1c1591ef059a43496d0bc5aef9d782a1d6adfb73187f8f87f98573be63f85d75b45c8e5072887816ef32cfc0d3e6d82463558ea5f91026e7a1e76ff91f8bfc3625cf6ccded6c91c1d316100679feb356d50c92420afb077afd87e", 0xa5, 0x16f8}, {&(0x7f0000000400)="9538c1ca09f853b0baff4db7760c59f78652982f02d1b60e6577ea333a792b7dad58a1bd2e1703", 0x27, 0x2}], 0x800, &(0x7f00000006c0)={[{@nodots='nodots'}, {@dots='dots'}], [{@dont_hash='dont_hash'}, {@hash='hash'}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@hash='hash'}, {@fsmagic={'fsmagic', 0x3d, 0xe411}}, {@appraise='appraise'}, {@appraise='appraise'}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_eq={'euid', 0x3d, r2}}, {@fowner_gt={'fowner>', r3}}]}) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000900)) 08:29:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) 08:29:02 executing program 4: mknod$loop(&(0x7f0000001880)='./file0\x00', 0x10020006002, 0x1) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='hfsplus\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8, 0x2000) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000000c0)={0x0, 0x1ff, 0x9, 0x1c09324e, 0x7, 0x26, 0x11, "b2316363c311aa1a4dab3aa34841621c95a43520", "aaa1b272fe5f6fe5dfbcf27c20f2785f129e503b"}) write$uinput_user_dev(r0, &(0x7f0000000240)={'syz1\x00', {0x9, 0x10000, 0x244, 0x2}, 0x4d, [0x7, 0x100000001, 0x100, 0x0, 0x1ff, 0x81, 0x0, 0x8, 0x8, 0xfffffffffffffff9, 0x5, 0x2, 0x69, 0x5, 0x7, 0x80000000, 0xfffffffffffffff9, 0x7, 0x80000000, 0x6, 0x8, 0x7, 0xffff, 0x6, 0xdb, 0x3f, 0xacb, 0x4, 0xfffffffffffffc01, 0x80000000, 0x2, 0x100000000, 0x8, 0x8, 0x5, 0x6, 0x8000, 0x64, 0x2, 0x9, 0x0, 0x3, 0x8b62, 0x80000000, 0x1, 0x7, 0x1f, 0x4, 0x0, 0x0, 0x7, 0x7064, 0xffff, 0x5, 0x4, 0x8, 0x71, 0x0, 0x4, 0x2, 0x7fff, 0xe0000000000000, 0x7fffffff, 0x7], [0x1, 0x720, 0x3, 0x0, 0x5, 0x7, 0x1, 0x1ff, 0x2, 0x7, 0x8, 0x0, 0x9, 0x7, 0x80000000, 0x1, 0x0, 0x38, 0x1, 0x8, 0x0, 0xfffffffffffff000, 0x7, 0x0, 0x8, 0x1, 0xf0c, 0x7ff, 0x7, 0x3, 0xfffffffffffffff7, 0x3, 0x1, 0x71, 0x20, 0x0, 0x80000001, 0x81, 0x2, 0x4, 0x9, 0x6, 0x0, 0xfff, 0x1, 0xa3, 0x8, 0x3f, 0x200, 0xfffffffffffffff7, 0xbce, 0x200, 0x3, 0x7fc00, 0x3, 0x2, 0x7fdb2606, 0x5, 0xfffffffffffffffc, 0x5, 0x5, 0x3bc7, 0x100, 0xfffffffffffffff8], [0x3, 0x0, 0x7, 0xfffffffffffffffc, 0x7, 0x5, 0x8, 0xfffffffffffffffe, 0x1805, 0xffff, 0x2, 0x4, 0x1, 0x2, 0x5, 0x2, 0x6, 0x5, 0x5, 0x4, 0x596, 0x5, 0x0, 0x18d12fb9, 0xd227, 0xff, 0xf9a, 0x6, 0x48b8e9d9, 0x2, 0xb2, 0x9, 0x4, 0x7, 0x9, 0x89, 0xab9e, 0x9, 0x5, 0x8000, 0x6, 0x10000, 0x1a6f, 0x4, 0x8, 0x28e, 0x401, 0x2, 0x80000000, 0x0, 0x3, 0xfd1, 0x7fffffff, 0xc8, 0x4, 0x3, 0x1, 0x82ae, 0xefb, 0x515, 0xa79b, 0x8, 0x1, 0x3f], [0x9, 0x1f, 0x9, 0x800, 0xde, 0x3, 0x1a3, 0x2, 0x0, 0xfff, 0xffffffffffff8000, 0x7fff, 0x2, 0x3f, 0x4, 0x63, 0x9, 0x7d48, 0x7ff, 0x3, 0x6, 0x40, 0x100000001, 0x1, 0x7, 0x3, 0xfbe, 0x0, 0x100000000, 0x3, 0x5, 0x0, 0x1000000, 0x1ff, 0x2, 0x48, 0x3, 0x0, 0x7, 0xeb9f, 0x8, 0x9, 0x7, 0x1207, 0x3, 0x5, 0x2, 0x5, 0xc5f0, 0x3ff, 0x1f, 0x6, 0x5, 0x5, 0x40, 0x8001, 0x80000000, 0x3, 0x800, 0x8, 0x4, 0x9, 0x3, 0x1f]}, 0x45c) 08:29:02 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x120) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)={@mcast1, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x1, 0x6, @random="0be642d8f10f"}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0xa00, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000040)=[0x0, 0x1], 0x2) accept4$packet(r2, 0x0, &(0x7f00000000c0), 0x80800) [ 211.007851] print_req_error: I/O error, dev loop9, sector 2 [ 211.020235] hfsplus: unable to find HFS+ superblock 08:29:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x400008) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) sendto$inet6(r3, &(0x7f0000000280)="d5", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) ioctl(r3, 0x40, &(0x7f0000000040)="12ecc9c13bd957f6ce0bc7c758741122c340a2b1de7aa552f6ebf7d1a67be1451ac23b3c78b5778b328ee3d2d5dd54d6f46f709eac90d2d6bf4150c86d3f0b63d61742a262a6d0c47a806315b382ee5d908adeaaffe48935990e3811d69c0c2601b0490197ec0bcaa211ad54a6a324a34e6852d33d1cc2fdeeed0b882ffee04d30c305dfe95e07afb7d91db6d85194723ab63d8e0d2d7eebd0de028461a0468d4f917694f1cae7a869a5b129b85d1948febab984263d3c9fc50196aed5b43b4c5b5c7683c78322cae7d0bd5d04178daa9cf1751abd") dup2(r2, r0) 08:29:02 executing program 5: socketpair$tipc(0x1e, 0x2000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r1, &(0x7f00000000c0)={{r2, r3/1000+10000}, 0x17, 0xffffffffffffffff, 0x1}, 0x18) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000004c0)="c0dca5055e0bcfec7be070") shutdown(r0, 0x1) 08:29:02 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) [ 211.051395] print_req_error: I/O error, dev loop9, sector 2 [ 211.057437] hfsplus: unable to find HFS+ superblock 08:29:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x200, 0xbcec16f7c3ede029, 0x80000000, 0xfffffffffffffff7}, &(0x7f0000000080)=0x18) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="03006a4ebb9c0203c9341f93c32c3e8386c06c6bd641fbf101000100"], 0xa) openat(r0, &(0x7f0000000180)='./file0\x00', 0x1, 0x180) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") [ 211.154882] FAT-fs (loop3): Unrecognized mount option "dont_hash" or missing value 08:29:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:02 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0505510, &(0x7f0000001000)) 08:29:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2000002) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x0, 0x1}], 0x20c0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x1000000000001) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x800000000000, 0x0) connect$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x8000, 0x1, 0x40, 0x6, 0x1, 0x3}}, 0x8) 08:29:02 executing program 0: clock_gettime(0x8, &(0x7f0000000080)) 08:29:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800b19, 0x20000) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1a) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 08:29:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000002c0)=0x6, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)={0x30, r2, 0x805, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x9}}}, 0x30}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syzkaller0\x00', 0x0}) sendmsg$can_bcm(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r4}, 0x10, &(0x7f0000000140)={&(0x7f00000001c0)={0x7, 0x840, 0x9, {0x0, 0x7530}, {0x77359400}, {0x1, 0x6, 0x3}, 0x1, @canfd={{0x4, 0x80000000, 0x7, 0xf000000000000000}, 0x5, 0x2, 0x0, 0x0, "f7903658d77bdf3c0aadef7379c9b0c122417bcfecd34fe30d812a5445b09f82c76ad26f48388cbe0b4aa9eadca7fc75568ec71fc3316c311858bab614ea5a00"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x1) 08:29:02 executing program 4: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x1000008000000009, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x1d5) r0 = dup(0xffffffffffffffff) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000300)={0xffffffffffffffff, 0x20, 0x2, "85877aef8a5e8101b45d17228a0992c49f19ffe1ab5fa32a72e1478756174ebe48408eafb9c4d2cf12b2f5f01789949b911589bfce5b78108a7120884b19ba0e473e42b265e7f6df6bd02b23287cae4c3aee4f67216c5aaa751f992ac6faf68b02e152b7a40e5f433355d8f83db9f5a9830af19fde3603894400bd55e76199d500b2b2f433702317ad7456a4faf7cd65dc8cf9eb7abca78cc18e19c7ebffdbc9dc6c46fa86348f6c0a8785a6d8262feabb722c084d5ec34e711f82fbf3639420a8785ecb8415c66d4c222c1ab8310c41afb8"}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41140000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x160, r1, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfed}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffc}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x380000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x521d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2f4e}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd50}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x44815}, 0x0) 08:29:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:02 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x6100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000340)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1}}, 0x18) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f00000000c0)={0x20, 0x0, "6feae6823d31071e59775bee420d763453e50744d5490f95"}) [ 211.507366] audit: type=1400 audit(1562056142.772:75): avc: denied { ioctl } for pid=8973 comm="syz-executor.5" path="socket:[32438]" dev="sockfs" ino=32438 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:29:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x301000, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x400, 0xfdf, 0x9, 0x7, 0x7ff, 0xf79}) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8000, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000040)={0x81, 0x4}) 08:29:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000200)={0x2b, "033d9fe22a095420fd36ecff1a1159fb2abcd1805f10db3123f907d20e0500000014ab4a911fabd68990f3a473d03cd4a9adff5c4ac3ef84aa07cb9a3474ccc6adcbb938b384309916fddbbec92a9a9b30569ea2550680fd586a0e306e33cbc06ba9ee3fb6f7d4279832d5a393f742fb22a9104d2a5158390e74e1c1b3492bb3"}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x4081, 0x0) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000100)=0x2) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000000c0)={r3, 0x6, 0x44, r3}) fcntl$setsig(r3, 0xa, 0x20) write$P9_RWSTAT(r1, &(0x7f00000001c0)={0xfffffffffffffdd3}, 0x6) r5 = getpgid(0xffffffffffffffff) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f00000002c0)=""/193) syz_open_procfs(r5, &(0x7f0000000040)='clear_refs\x00') 08:29:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) madvise(&(0x7f0000027000/0x4000)=nil, 0x4000, 0x4) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000017000/0x18000)=nil, 0x0, 0x10060, 0x0, 0x0, 0xfffffe16) r4 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x828009, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdn=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',noextend,version=9p2000.L,uid<', @ANYRESDEC=r5, @ANYBLOB=',audit,context=unconfined_u,dont_appraise,euid>', @ANYRESDEC=r5, @ANYBLOB=',smackfsfloor=,obj_user={cpuset*:,\x00']) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) ioctl$IOC_PR_PREEMPT(r4, 0xc05c6104, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x40}) 08:29:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa30a, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/icmp6\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x10400004) 08:29:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r3, 0x80000001, 0x52c}, &(0x7f0000000300)=0xc) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000180)=""/34, &(0x7f0000000200)=0x22) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x25, &(0x7f0000000100)=0x8, 0x4) 08:29:02 executing program 0: clock_gettime(0xfffffffffffffff5, &(0x7f0000002940)) 08:29:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:03 executing program 0: clock_gettime(0x3ffffffffffe, &(0x7f0000000000)) clock_settime(0x7, &(0x7f0000000040)={0x77359400}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000000c0)=""/248) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) ptrace$setsig(0x4203, r1, 0x7, &(0x7f0000000200)={0x3a, 0x2197, 0x100000001}) 08:29:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x10000000000, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) getresuid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), 0x0) stat(0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="00000000000000007c08373ba80700080000ee8b08b7960ff7aae2cb6e041a1000fdff863809aa0063e62555fd964eda145b11a8c3b8f654b8000000000038f70f651f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e212fde7c0eca620000000000000000c91ac4bf500000010033ccfd435a143bc66ed4d2865babd0e773ffb90e884d15424cd5e743d46a8ca5c988c24e475397f26c0f75a738b600ad6a8e4c3085238314f70711e711cd96f2649cc51708670919150ddf80f9f5f6194a995692be22887fc0909e3d5225"], 0xd2) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10}, 0x10) ftruncate(r4, 0x100) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f00000001c0)='./bus/file0\x00', 0x0, 0x0, 0x0, 0x120000, &(0x7f0000000740)=ANY=[@ANYBLOB="63726561746f723db14246202c706172743d3078303030303030303030303030376666662c666f7263652c7569643d", @ANYRESHEX=r2, @ANYBLOB=',part=0x0000000000000005,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6e6f6465636f6d706f73652c61707072616973655f747970653d696d617369672c7375626a5f747953653d2c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f6e746578743d73746166665f752c0000000021a20982e8e12b8ae00a677401e8933ce7bff182028812db7270e4844ad1b77d14f7f40fd5d18e71c0e6e881d0006638588675117fa308903cdd21e4bd1e40745eb7e1eb7fc3d6d84cb6783f3a6fc1d1cb92240000000013a19bf44e2190e471b0801a6146bda88d76870bc31b1e8d813e1a"]) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000300)=ANY=[@ANYBLOB="2a00000004000019c1428c7cf8cf988bd65c70092a913e43372b79194e5e7ce7855c2261ef11905b44528c2ba23062bb7b198499d012bc59dc56b49480c607d1adbe195bd13cd11a7f97c5e9eb2df508a8d0287d8d3522"]) r6 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602209, 0x5, 0x4002011, r6, 0x0) 08:29:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'\x00\x00\x00\x00\x00\x00\xee\xf3\xc6\x00', 0x404}) 08:29:03 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x2, 0x6) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x7fffffff, 0x9141, 0x0, 0x101, 0x8}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) open(&(0x7f0000000240)='./file0\x00', 0x200000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x400000, 0x0) r3 = dup(r0) r4 = openat$cgroup_ro(r3, &(0x7f0000000540)='hugetlb.2es\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xac\xd0\x11\xf0\x9e9Q\x8fR/\x19\x03>PeeZ\x98h\xc6\xa7\xd9\xca\x9a;\x88\x1cT\xafc\xe6 C\xa0\xb6.?;\xc9XB\x9e:\x9b\x7f\xdc\xa8\xd9\xa1Q\xc0v\xf5\xcd@\xd9\x15\xa6\xa0\xd3\x83\x02\xab\xad\x8dC\x97~E\x86\xb7\xe7\xee1\xc3\xe8\xf7\xec\x83+E#\xd5q|\x9d\xcc\\S\xb5`{\xd5\xf3LR~\x8e\xc3\xbe\x1a\xdc\x16,\x96\xd18$\x8b\xa2w\xe9[\xbb\x88\xa2\xcc\x95\xd4\x12\xc4\v\xa7e\xfb\r\xa0\x1c^', 0x0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000003c0)={'icmp6\x00'}, &(0x7f0000000600)=0x1e) timer_create(0x7, &(0x7f0000000200)={0x0, 0x0, 0x2, @thr={&(0x7f0000000700)="f0deb6570f769827941bc7d06cab9791396ec6c18238566c15cb307e2acc1d7d772ae03e8c712ae3b26ccf67f71bdb46d7d5ad341b19e17f84243f06b8555983d4bdc60ea6958a7ab299ce4548c290bace2a33c8d68739d381ffc38251c48f184fe01ca0f7c5fff38e529f03da43e9d26a83fb648012bf701fe6b60da5d6e267e436b0dbde95c3978a9662044f8a93e123a050f20d1a54ad3a4b7726d2e6dfb3eb612c72cb3faee9d9be0f5812e12e8da429fc921c54252fb8d56abb8657d1793889cb1fd08129be6337e7b43d2b71012eafb4b39ba644", 0x0}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000300)={{}, {0x77359400}}, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x2, &(0x7f0000000180)='}\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff6a, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde7b, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(r4, 0x80045439, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup\x00', 0x200002, 0x0) mkdirat$cgroup(r6, &(0x7f0000000080)='3yz0\x00', 0x1ff) mkdirat$cgroup(r4, &(0x7f0000000140)='syz1\x00', 0x1ff) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000340)=0x8) umount2(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, 0xffffffffffffffff) 08:29:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x7, 0x800000007fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x400000000000002, 0x4b2e) ioctl(r2, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xa, 0x3, 0x8) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x20, 0x40003e) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000440)=r7) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x194a) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000002c0)) r8 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[], 0x0) close(r3) r9 = dup3(r0, r8, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000e7000002000000000000001400"/36, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$key(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0201000210000000000006f6fffffc000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90b2bc791a93d1260cfcb71b779839a8713564f074461669c16c64aedc3c25152e01a8ce5141e33580d608bf181e9f9d2e98e88e508f32571efa7ae4630fc30eca5a3769370b5f39e26fec23cee7a88cbab031bc46152"], 0xdf}}, 0x0) signalfd4(r1, &(0x7f0000000380)={0x6}, 0x8, 0x800) 08:29:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = geteuid() getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000001c0)) r4 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}, {0x2, 0x5, r2}], {0x4, 0x5}, [{0x8, 0x1, r4}], {0x10, 0x3}, {0x20, 0xa9d8eeba8fa8dd71}}, 0x3c, 0x3) clock_gettime(0x7, &(0x7f0000000080)) [ 212.004105] audit: type=1804 audit(1562056143.262:76): pid=9036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/73/file0/bus" dev="sda1" ino=16813 res=1 [ 212.053427] audit: type=1804 audit(1562056143.322:77): pid=9040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/73/file0/bus" dev="sda1" ino=16813 res=1 08:29:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 212.182334] audit: type=1400 audit(1562056143.452:78): avc: denied { map } for pid=9032 comm="syz-executor.5" path="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/73/file0/file0" dev="sda1" ino=16530 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 [ 212.229513] bridge0: port 3(gretap0) entered blocking state [ 212.236091] bridge0: port 3(gretap0) entered disabled state [ 212.270732] device gretap0 entered promiscuous mode [ 212.288286] bridge0: port 3(gretap0) entered blocking state [ 212.295340] bridge0: port 3(gretap0) entered forwarding state 08:29:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x7, 0x800000007fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x400000000000002, 0x4b2e) ioctl(r2, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xa, 0x3, 0x8) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x20, 0x40003e) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000440)=r7) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x194a) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000002c0)) r8 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[], 0x0) close(r3) r9 = dup3(r0, r8, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000e7000002000000000000001400"/36, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$key(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0201000210000000000006f6fffffc000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90b2bc791a93d1260cfcb71b779839a8713564f074461669c16c64aedc3c25152e01a8ce5141e33580d608bf181e9f9d2e98e88e508f32571efa7ae4630fc30eca5a3769370b5f39e26fec23cee7a88cbab031bc46152"], 0xdf}}, 0x0) signalfd4(r1, &(0x7f0000000380)={0x6}, 0x8, 0x800) 08:29:03 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x7, 0x800000007fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x400000000000002, 0x4b2e) ioctl(r2, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xa, 0x3, 0x8) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x20, 0x40003e) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000440)=r7) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x194a) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000002c0)) r8 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[], 0x0) close(r3) r9 = dup3(r0, r8, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000e7000002000000000000001400"/36, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$key(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0201000210000000000006f6fffffc000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90b2bc791a93d1260cfcb71b779839a8713564f074461669c16c64aedc3c25152e01a8ce5141e33580d608bf181e9f9d2e98e88e508f32571efa7ae4630fc30eca5a3769370b5f39e26fec23cee7a88cbab031bc46152"], 0xdf}}, 0x0) signalfd4(r1, &(0x7f0000000380)={0x6}, 0x8, 0x800) 08:29:03 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@get={0xf0, 0x13, 0x8, 0x70bd2a, 0x25dfdbfd, {{'ctr-cast6-avx\x00'}, [], [], 0x400, 0x2400}, [{0x8, 0x1, 0x7}, {0x8, 0x1, 0x7720}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4040091}, 0x8040) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) 08:29:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = geteuid() getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000001c0)) r4 = getegid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}, {0x2, 0x5, r2}], {0x4, 0x5}, [{0x8, 0x1, r4}], {0x10, 0x3}, {0x20, 0xa9d8eeba8fa8dd71}}, 0x3c, 0x3) clock_gettime(0x7, &(0x7f0000000080)) 08:29:03 executing program 3: r0 = socket(0x11, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000e40)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000f40)=0xe8) sendmmsg(r0, &(0x7f00000033c0)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)="5ba460ac98603a2d05d8b2662cfc1bf2fc1249f3ed6ca1cc52b4dd77bf7887f11bafcaa32d47c302d38365e45bb989a14be2e4bb9fee2b739e66211bbc6efe4dad15eef500339b80195b75facfca96406fa2034744119e141dfd32", 0x5b}, {&(0x7f0000000140)="424d47337481e4a07b9850abda859f5f75d062799e2f718d135ea6c27b4178c7aced42f1c2794547f2b10e0e4fd301bf8d38dbf6285f2fa9b677821fb53c0c4ad3ece6", 0x43}, {&(0x7f00000001c0)="ae650d8ea3e433f892c8b1da9e904e896e6b9a01605c3d605835b936efb13c356c161b4e66a04fb8288eb9fb4eb67cc55ebb2a0389de85597fd9dba455f71eefe0447c550024826109f844142534a03f42f1cf7c5056455def18241bb045697fce59b5006d66551e94a15be6697936a5183243ae3fd32ddfa1b7824756475b", 0x7f}, {&(0x7f0000000240)="3f2cfe0ba8fb367d832eac11f5706eec7c131b9f22bdd5f00906e9ad36dfac4c469ecb382a2a1ca1a693285f1defcdf6b47d41bf2d5326682273f392d215f973eb28d42addf3b2b266f8975208805ea7ee27a1ef3fae071822d6462aec90", 0x5e}, {&(0x7f00000002c0)="f7388c27ffe034715261197bf684cda08ac4ace74d8b6b65131ef1d93a96a4db7e3c8e9dd45da9e28fb190c0f4bc8d46636630955aae3c95f2b703f8e3491c575d2fe95ef8b34ef1586039f4b2720fbeb2b30667961ae3bc5683f0b70f78717f9b466e1e6140797a0b8e402583f957d80f3a5400b570103db529b774389ac125750d3ae52acf96583694c90b6eb16f9debe53c9ead6b4b00ba8918f5c920ad46cf9cdb2f9c8facc7c0ff2a046d3ef4496a7fb9ad3fd2c1fc831e8ed3bac7", 0xbe}, {&(0x7f0000000380)="dceb154fa951285d0437219ef349ba60649a2f121cb5fc0237880cb64f0824b955f4265950425a1e853c86c0829b3f3eddb2a19c6c39a382a761f536c722a9c2aa06d39b6790b96eb92ae68b7f78195c5e5aa8e46ede821f674f0e7b29204dbae63aa6b71822abd4b621381e4b34b9f97b6eebe6189ff62ac22511a4953726970e40b534b9240df86c563369715c7afe20ab2bd7c05f3b334923b339f965c0ccc003da6955a81b974dac4fe6b92ee802bbfcab2aac1465616532bfd4e807e67bf46d4c937e22ebdb467740e3", 0xcc}], 0x6}}, {{&(0x7f0000000500)=@l2={0x1f, 0x6, {0xf5, 0xb170, 0x3, 0x5, 0x100000000, 0x80}, 0x2, 0x40}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)="17d621b7bfce16ac96a2912322480467cd6dd8a26db7f0f7a84a28c7bab8c4b4779c657c6d2e24e893b6648c82d3c711d389b066e102951e", 0x38}], 0x1, &(0x7f0000000600)=[{0xa8, 0x100, 0x3, "9cd264224435c461cdc3a98b7096a31bef0a93d8c616e5958885c5851472ab7f853edb71dd9d8e7a148dcd1f3b969f6789373292375d8d2359629d987e988e7ccba6704b845ec7874eeebc4cdcfa542359e7800f2f53b38a47aa0b0c31b29d4cc41938069af08578a85166d5bbbc3a8927e6e58b94ac259058d009d48ea317f225277b612f6a4cac89c7fbcf1415a3df3e5a89"}, {0xa0, 0x0, 0x8, "50e12d81dc837187437f7009f3cc0faaf87bca3f281456c503e6f73fcb837528f077df5ddda1133b8aca839e8fb88cc675cdffd82cf769d8d20cafcb084c189bc00401a1aedc685f949430656568240fb432257e71364ed12f62533fbb1e6374d89388db6b4e4189682c47f8f6c58199167386df67579a89631012af771c6cfbb3ce9adb3c8efddd93267b7fc5"}, {0xf8, 0x5b5d0081a059e4e8, 0x6, "9596f382a06dde0f7a5a1cdbed49baced2753a40c5f5ced63c003ff072016e92f54709cd5ae9564c054ab47e09e566f9298bb20e332b18ea8e511aec5b4042585354d6bf1f5f6988808f725cc245321a448d27937b3fe8a9cab9663c04cabcb387c7798d61be811fdd0c82f912a8cbe67af9b29d9b0703aec8842a5134167cd648104074e35d22b7c590c9778f0fcd84ae05a1f3eaf52f8a8e52dc121cb18a1b2106bff1eb2236aeb2511377190f9b9e9b58defa6747aca26809edd2a02662361d9820655a2ca4495603a32a5cc4ba9981ff0f75736a94cfc5f54ca7f44f00fcd3b2bb"}, {0x40, 0x11f, 0xa43, "f43334f87c843a688c7108922c85a627bced3538894e1a17e7931661af24219af9227556687fb1982bc0fede"}, {0xd0, 0x100, 0x1f, "3e8d94dcc2d624b2c8baa9d6910475c7e3a865a4899dbe2d0f0e213a93f8b12d5c39d09f2b37b220f6e2cfea4ded7fa51f20f6fb94f5d76978d2b180f618d76741593631e3741641114f4ec77b1e0b5e1a3130dce093b8fa392d84fa48a614356065d1ef6b6d1c16c6cd89e8c54a32dd730019f05e759a6230d396fac4f3c9be2ea54402399813ba866eb248b8e7f24ac4553052d1a30f96308ec80e3db5d4fd83968aca5511aea5b58ea113326ad69cc52143cc3fb28abd80793edaf8e9"}, {0x10, 0x102, 0x84}, {0x68, 0x104, 0x0, "3d1756d53ddcc03c811118453f692e20e5fb8c1a3a5721539d5c99034c3c65044cb0805384ee38de94b9dc574521062b4c200cd0a8de09b5866f382631c46cfb345d6087c2da6a20f2feff28957e84a232867a52538a8d"}, {0xd0, 0x115, 0x7, "1a47b6e9656f582cfcf9ff3cfce4444ec3a9dfb3137676c4ef1468814aa83351070b881b1ca9b1d26a11a8cfb03ac1478ce186eb3cb7266091a2867a522c30aec5706b9c8da9482fd3b36ce65cdc369090dfef58671139ad9c947794e248ccf54b9b8200fb13073a06cf57474e43fb9d89898fe32b641640639d81aee8bfe0d2e8f6b6f502857154229c2d8e99d3db0d3738c3226d29d0287420d722b76fdbd324ad9086483d6e394e26c479e72a66d8b5f12e1bd627842eb381"}, {0x10, 0x102, 0x81}], 0x4a8}}, {{&(0x7f0000000f80)=@xdp={0x2c, 0x4, r1, 0x2e}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001000)="b82ca10e41bfc66f24508b1ad71bcf0bffdcb541d95fbbd8d7dd9424c03ada67accb5aba9e74011486822da1fc5d0d7f5704cfc531f1aead26994eb90e7339d77f749bf0a826cfb0d78eeddc571a7e63e2cebc523a87db96c7d4f2d363e1f0d10dfa08b2a1d95d2a1114deeeadc6c5bde2375dead0c877311298210088232fd6b398c3b714de740b2b75c403529e532cfce9aec440dec7d0a331959c477ef748766f680b591d311c9ae6a2c51c25f007ee8eab1b42cf01246184137bf4ccb9cd756ee67ff72a13dd592b3617d9f691", 0xcf}, {&(0x7f0000001100)="e637546eefe656de6a114bbda67553c4ca7c916e5c96dbadce469fbb110306d7e437d4b02bbdd6f86e186eb44731cf0dcb683d329074b5bc78d0e3266c115bd267f830955d2208279dc77fdc687f8c5260a37ab8f374b42e23b52aeb87fb737c7338c353fa714dadb4f20df8916adfdfc6aa3052e4acac4f2ecc3eb1a6bf51d1c8267e8efb05250ad2f34ab3f5387e2985a6b7aadf0792c0d32fcf47253f95b7d9bcc51750211a257d5f3856f917c4eebf78077a79499c2341f0b0c2e47762951faff3cc04d59ccdfb3f567fce01f26d554b51e926f6a3579e7bf923b487d9555fc0736b57dfb92f5d36a865f1", 0xed}, {&(0x7f0000001200)="10ab1656d63b2b30dc5aca38c75657fffecaab5b415441f6ade50098d764c9eba4dc3ad9df4308f30bf9aa1e98b3ac8b87ede9ba3f840afb84f1fd0e96e528b3676a80111e640cfcbce7ff981a20e7c13be63f64b6be27360aa50cb26db4420484c2b6ad149ec8f82f8d2e41a56fc98fa5f40627011bfd567bb57e2567d41753ffd861e1b67f7af50a", 0x89}, {&(0x7f00000012c0)="71c9f86c5cbdb993ef5be51405355354805eecf3e00ae644fe2055b024aa0f19bff515336b5f0573", 0x28}, {&(0x7f0000001300)="27e59469aaafd20af0727730c72cd7a448c779bc45d5511b94b3f169b527a0e2ebdd4f64e99964ecfe85c7d6c37ddb638aaa5359d5e2b0d0afbf90d22d80edcb962a015de9f5c281e207009ad09668f4971d0bfd6d22d31db074e1738e88e9d44c31647df90e7aef1bb612a81f666cc905fa008353c5d44e78afe4ba01a983759e8f5278a1670e221497e10a1bd6da6aacc1a116ee168473d3ceaa3a81367fe91f78b1b3b866908fce40321053420fea5e4ee39c9e9362a1293cd830a5936b7d33097a4ad4b7f833940b366363bddcc8cb9d1a708f296dabfc8bd4888d9e8d77e80d79c545", 0xe5}, {&(0x7f0000001400)="c3d599ef4907a5175ee4e85cc065db3053ec109f43670747f278a48677994b4775d6e517f8e737e609dd1080f0a5224f7d2936cb2b387984593ad5724eafb531e23ee4434e62d4ef11b71b000aa9eb35b4240355d1c9a2e6357ef5064f0d61d95555773bb23413ae9fc5f94983298b7a5a9ecc18eaf2b08e71f65661f685e7c2dc297c5bedd7250c153de2266271710f0ecaaadeacf4033ac544517f5155b841a3c301cee1f84dda131a89762d28406382d50b4c61fa9009c8e3690608d4690e837ee50111bd61b0c57a42e97a0ebd8f8d98eb8e52a7", 0xd6}, {&(0x7f0000001500)="434e7c73035c4d450576b210e99c5e882cb499e3876384bb81f5f0a3e7c8d74dbd9b280774512013660be6a6f1aa8a34cf0c11e065420212a914fea6082fdc2103f19aca74a8e0b515a2bdb4e230007780a6e62be763dbed6add0c1814e48e61be5b35e7c4bd764f568a1781aab36f8e6b38fde417a7218e9ff77733a948e8f4470b6f816895df16bf0a4854f21e520ae08d0ec5442394", 0x97}], 0x7, &(0x7f0000001640)=[{0xa8, 0x11f, 0x81, "45c197f855ebb39b3648a07c75cd9331828dba10e965a1ccc0c65d7094d5a16d5b88588ee5189d26620125670034962e4fcfc3e3041577726befaa226b826fdbe2caef2727d3e0d729dcf21a8364f27389fa91aee229f73cf8f5fdd946a0400bf5be70880197c7a2424751d4fc2ac0785c945e3beedba45500f1aa781c9c8c10c77d527599eed3893e8be724efbea18d1c26db"}, {0x20, 0x103, 0x6, "4345ba6840b6f28d2b059f902d2c16d1"}], 0xc8}}, {{&(0x7f0000001740)=@ipx={0x4, 0x3ff, 0x0, "e623ce40caf4", 0x7}, 0x80, &(0x7f0000001c00)=[{&(0x7f00000017c0)="b90223de17b50e229b7c08317d5825ee6af7278f417ed9c0a7cddda3ccd55c99e9cb275e4eaf5b3911caae6605a8118c986b2bcb52d3f6502318a4b31f491ba4b1a5239df9ccbe45f1332a5d014beb7a82ba5a11e194577dccc80566ac76abfc1294982b7236fd6e8e0cda1fed34c3db", 0x70}, {&(0x7f0000001840)="6f4963627d62a8fe5efa9cf66a05c1379a59ce9258611e7d35d75c109ecf44ffbfdf4bae06a7ecc44f5aad69040ca4f07eed00f8f836cd521719f7fa88f598fdf8a270a96e72557751d27e41552c4d27e9ee0b57861a5803f4db5ea89a6ba3d4bfb24a7ed7a04444cffed4350082a92ed30c0fc4bd8ad17a", 0x78}, {&(0x7f00000018c0)="8a7a5cd793405631ee7ee890be8aaf0300a9d679db13712892cc2a6dc6a4365fb07583200d0985096098566b891911e39a2800140c26364aadb6e1aabf786d407d3c4efe6ee51230e05bb092719592ec0bec79034837e467b884b1e174da9ae40692f3072f3a1ea4802ed45c6b284219f30d0821b2d1458adc3f7213d474e7140b8a12d19fe07f655550786e99e9e5315757212f", 0x94}, {&(0x7f0000001980)="b37d9d1195d7a35750cf7257d78fcbe01a668bae4cd1196c1ffc8d139dd731426c06bef00d8d910f200ad999e1", 0x2d}, {&(0x7f00000019c0)="755886de4e6b78791a1d6289292e2c4771348d7387cdeabcc12864c1afbc03cbb9fa7fadee39da1eb750c31dd0954848acdc2db9ca3c80c8f3d20f4622ea3ac9cb804cbe21981dc35ae65e7686980b9dea90296dc335138ba1ae78c57306ecdaee7a0865194150e3c246d56442c19a26abe42a9b3cee4f9182d8ab6b46cf7467ec3d3be1e64a50a69a574f59dc44b636328f4365a25eec32b60703d39cd18802d84368b02d115f39ef55c09417e547f02dc61baadc8de98067075e0430b0f4501e4b840c4fb7a04a44aef4563a2fed90db9e671b27d49e91f6be", 0xda}, {&(0x7f0000001ac0)="fa69362403a0b6b649f7ec73f480177b7489989f6057bed8aad364589a7f476daeb9c599ead287f5733a07bb1d1d6e310db894d8e3e692b86e58ad3cf6981e0199788faaef963572e6c886b3", 0x4c}, {&(0x7f0000001b40)="f84a15d25e125c9d2b2410372f551f071d907593f7b384197e1a962e32f7deb336a1d73ac1", 0x25}, {&(0x7f0000001b80)="1139b114bee2dbf6747f3a7c4759027ee5140791ccf6dac6ed5d", 0x1a}, {&(0x7f0000001bc0)="759560680e1dae8b5cb279390174e5a583856fdf0cec23c7825a549a1adc832baac70d5c685de43014b326ed1d9be824b177", 0x32}], 0x9, &(0x7f0000001cc0)=[{0x58, 0x0, 0x8, "b195a56ed676d247bee964d9e0a2216b5151c61d8634f59fcc1b9008721156e73ffed42d2eccc725e1c780fdf3c41f421e70364ffa8dbc668a9de337f30b84dfd0eea8"}, {0x1010, 0x100, 0x0, "8747b6932d18cd34b42a01ecec5765a2a0fa3ff343a2d95ce65b6a5b4e13452fee0e128c1dea295c542ca1538a049418c73565c72b0c48002c0d153d1856268404b4c42a3038eac0a86f44903034bc69bcde4ed3e29ab6a491a7102ab7390b91c0f8947c4c9248a205858ab2cc32206b0525a0c7abb0d4cc894ccfd1c9ba30b78a82f028aef2b123839a432cd4ff4f7a820f814a20c2d33d4fab60d4e0f5d6c87d3ed4e3a8047869e9a5792cb7ca8e8b3abef9bb86784e1e3b0937b7ae9eac2451849b8b312b9d0a8717c7b50905bfc81ba13d4716367b615a75838721a5c6fc4f4285bed37c39b614791c6ebf3816dada387a5574adb49cf15879ef1d92a1b7d4c59486b7145759e2938ac9d231b39aff6d8fa7c0f434771042138154f4b66ad251ef8f128f26e5ac9dfbb49ffd089c691dfca368bc51448429ca334a48f45764c29f9ceb2eadffb7750502b00dd63eff793e5dc99090a8995342a9e8cab304d76b97146ccc6c3d9904e217e5d4567ac2cdb028543079db5a73de37efc3ca3f6d9e9d30729a460a3f6f145685f6e755b0d498c387c04e4f4ea7aa7b5b2a1e569813841541d446edbb6a418e06d7d48aff1e150fa46cba927a22578dea9aa685ffb9f97503df7acc034f11c984a5787212ae7993bda7c0fe739535754166b738011d1623ed9abceb406662a64fa3ff1a96691e09e97e4446127cd7009ed4ec3dc8f8d3627a262588c01e6569227c701f668408451c5c832dd0b4db48b2360b943c20d8e0f88612baac06e1e09de5fd297b28382e8de7bc55b274c3dc7c20fafb6089601a149e0b4bd1408f55d02e7fe862e8a1708b94e4302a4759e2f5b6f65e85b60c6c7696c545d29a402f014e6c54fe175fdbb745285399045f312b2b044489d55ace137e8dcd07fcc6683c84db9175d365c93cba9b731854ad2dacab7aec0a75fec8fb7180f7be9338dbaf1794db34e7e666aff878d795cc94f8c712699482939a62a2ed0fbf1805d424c00b06ababa081a525d8ac0419d321da83b45d02f402d728866fca4498b7c2097490e13a47836737e5c0d70b96a13b429c256c7d586b4cc60d61e72dec8ba88fcb2d5f26fcc1b35adac8446092f7d61308cea1c1a3020f3a70b9670a45976ae54e72ff26367a68ef1674e76c302f8e038563e14c6b01e70cabc79dd0cfcee2831593fad434dadfd5c8c83bfda44b2face772e553adf76f5985e2edc6c3b4102c14a950f5cb145dcd60aa0ed687e61c9523b7b93fa6eea6726ade2bd5f094b9ff2e33c76e628579c28a65c211f6d22f11b030db3f53156f51f7eab952e91e565e3a83e97a6648d3c8598c1a1a4b003d20a6621c6c47ccfb52321c3612dc77e479cd1e8d2b6233bcef931bc86933f63dc4e88a4b734a48d0f3406ce2eb742d2aa7d06b0a0ed78cc55fe9d4be18ec43321d3493e67a4dcb98a90b2bad9375d830421a70b06b9b6e7af033c8f4624f4419932972b25fe0f537b63a559547b0a3c05bb88040b3701d95cde131b7dba07a0cab4c06aa00434c9d5689d25f28d392d6dda6857d77b58a0bd08aef0db04da7cf805701d0c3cc073d59fbed51fb1c09b5522958914cd8b63c8bb50910bd7b9ffdc3621f3e8d16a4f555537265badc69c6b97a21e03568df1d33592734de49b471351f282f27f7c2a08d6195b194528628003f2f183e28f586fbe5dc1ae39a42004c1430e16f3072b4495f1ed2edb48b2f3f6f13b71b83a7a8b3985b6fcf173ca80fa5d1621601bd01cf6d20e8cf66fa5e7948c31cc147b0110daddbe0fb40215ad7524b571483d655c1d16acc7cac241ee135c96f1b61333148a18403435f0ad1f755830533fe36d11cde42870c672468d99f2f1d5d00619a5d8ee759af1bd17e430f168335b648461b3cab7550926284813c2d41f184ab83831661def6c90fd473031302d6e201511832721cfa3bf5369aadb728cd857f6218223f4de4f2f31dbd20cb1a354ee8f0ac441d145655e5844b35624674087f930bca3bde95ea6a6c4b1c5b6d4c364fecc8faf7f703ac2b3787c91afc6302d69768569c9355e0823310722483c635974e0cded3a2de98aa6e15f56526ad848e3f15f46df459d3d12053f728525d0929191291c4306063d03bd6436c3fc49c7a7f8c343031dfa2950b0eaa240370d7b60109f8672ec9199680955a3cc5bd5d579eae4eeb84177dea45c4445135b6e75d866465d797e0ba43839e15e3af6767bb266437a6acbb02a5e95064eba368a6d155dac971d3cddc45784faf1a245bc27ba82ff0fac46193c580b91423a78ebd1c548eaec4f454cef952efe4b37e9e455df284e026d46c3e5589600c601608c2bc369c6db887fd88b34ed63e617e8a53e4b5d2defcf9b4d16191d051e06389c0a5d51dde2964b228c14813d19ad223d6411f76b708a744aa7bac8e889addc96b40309255a797b05e96d45c6804715c7c72220415ee911e7d956ed13434f23d5279e393885928d1c3998a9a74d85dba3d265d723ac5a27914d5065afe729436863d08e121e5c58365ca964b3ec2632c655db2e6e5124bc80b1ae294c63cacf63012a0fdcd20d839a2ad29b4d7fc6cb85d8f101fbfd5a7ae1d6252286f78fab024688a9484207612b5601e321480acea18b7de03b6aa6d13ef371ccb9b062fa731173d7999bc777185b2a7b682843e09c2ef65f613b207535e9ff1a772e9e67dd4167ad0c768333c91a62e298f2abe176a5d19c583c767a2cf06f75eecc29635d399fff27e534c8c1756e3cefe92d2e7344329ec7ebd202ec1fd354b26d371b524285a52e9d402e23ae1165a46b1676248cd5852d2a38b8aa37b53f5278239bf446d1f67222945e60301e1a3337aa8fbbce585aecf67ef133c2fe5a7f5e224930929ee586a32c94fa54c5ccf74fbd6970c1ea55e7eb53ba50599da0870c28999c3b46990b988f0e3737a2fd8faedea30847028956bc27aab0ac30120dc2a5976e277a2a1e4ef350a7e58389595ae3c962ba4f4bfc4b5ff18a8c16fc85618f083a119c1d66ae57387aa70cd760861c48dffd0c68b641ed4f55bcb76ec07b73b26664953caceaa92c297e23d078b21514d38fb7bb177732335e17af79214339264e8c038e337569544e74856a678101d58b07bc9f0ec42b4e051980ff8f1a6218f0489d2d7b07312ee2813ec19ffa571b71317ac3b79be414037c44123bb5cba291f7f6ac60b59a1133df2519256a60d8da3fa40fd631bde164895d23284960468a1910364d8331917d48442b641c805fbd529a0a661117674ca52dae56952c441d73cb0fb061565993bd9f5430de11e060be6b87f7f4ba66e79e14b640ded2a3caa6804b0ee93933d45945d75f839e4979c3fe9dd6786694ae084b3370829e4c3d4338516a5893965e23e0cad8bb94456e15300a6e9b6ae7fa18d0593b3b557f59fa0ce94ac3d5777a3847f4ee8747098b6766813a07558af24ea0bad8085d276b6c38fffd2ed85d99600ac0c13c11eab1cc7c3ef8da46a857c0414f1aca7b84f70eef463ad64b33a92f84e927c30afe47f697fe68ab8c7718d19bb5e02e62346ce8de873a3acfad2e766edd14d797425873945ed8e73fc701a34503e54eddbe027a3ecbe50b0a7f66c2b64d0c5567d39acca7d8221f861db1509d0698ab37e2a23307c897b63f4b156e1ac2096d0b50d0f308f839f91a009158fcf1dc547a063742a4ddaa9c431aa6f5a857fdeb5e8e6222f16d317dea7d06d2a3c53581dcdeec08b97530f31d50e973c532833dec0f0e27a9204cce02f3efebd477c701453080a4be4ba2fda9a21f9d166ff819de5dc65c835395627e9613aa4a45b7842ea520f59184c02d580d7085d80a05bbc1cfd1aab8353b5d2052e9a06c803250444bfc4de9d2ed4012c14f5497a1c527134b720367a5981815a0e0509e4564ab757152dd2344e901c7a5e53cb21467f54335c41493f60e7c7e2dc4ddff90104e0de5ce5c01c7d4424b7e4b871dac84e72468c5cf193d9010591f98e7c235576e7e682c27fa12ef534e689ee0123cf0efb6a9241d06bf547bca42c759704687d50fad48d79f69adc40a5ddfb672125c4d3d4445db427b1f587db7940428d0916e31e89782593ef0730f67c54b0e17e1c5d18a3176031f96586a6a0617122bd7af71f982d93769819327a6b18f401545d8e1b5eefc2ca6305d5481303453573ecabd990446a7824cdea642ef6981a9d955dd98792f93680d36c20605bbb9488ca4080f031a0c228ddef37e86ca7b353bd695a2513c58587e48381cda1fadd2ed2aa66d457eeca2797d9f8fd938557cdcbba500d8b96e6d4c3e9cc9f495f78a1cc52caea1fd049124d6da079dcfaec0dc2238cfb23a8afaa22aea933e8cc62877006c2b77b5154403db54023f1dd0ea08626cb65eb42652ce7bca574a3aa5f25b53242381f2a430ea2428f8c93636952e1f175820dd367850ed8b0c0124ba57613a0b4fce74a7378629d7e48a4a412525f931ccb53f6a8b5e7690b0b8625196b319b873cd394e9ad5c5937fc810e92b88e2f052ec8bc161529ba3b90fae712c69bfef28f893c9d7328367fb86d88c51428d492fcbf5b3e8f0274bad25933ec72bb634b99122a4d46b2a97bb79dafe4c8678b31626ac3a48e090d2e36a6b423246810726571f77fb4617ea47a9e07f95ecbb886cc9c8c27214e803b33a138e1d00fb50c6067a4e2e8aa43c0d5fcc900d45ee850e596a324fee4539b3b7fa4fe111107e250d9c1d784ac4ec29f7d63e9b5f9a5bde2eef5abd6c297c3462cd6335857dd3bf9382090f649611bf940c5f1df7ae98e83825f8a2ad6841edd6c8c656e33c04e5b422a50aba9c6bd6931ed14f4e95a2c10ed7b23747df3960cc4c8fa893a4515df4bf5249de9cef2fa0ca9f428679c2dc90c3e8931690186ad9486761009880492a8bf57f255cf9836f81c0dd79a70425044b1ee92fb04afbffafa91dbf7465e0b22534a45c0f9f00f823ab108cfd30663f94423b3cc5849dc29bf6d5fbf87235ef5e15bbec08478462aa70981b2846f61283b5b8589aa91a8c0d47ae60aa548ca3715b0f50bb3af31cbbcd5762de83d9f5a9d24b654cba41b919152cb14dfd9818658cc02ee1c3c08e333f8bc7b6c2df6165e48bc072d1c639a5a91bb5f607a14d0b91c42afbb9557cb84a4fe12a8eac78f1ef554df15016458b966bd3144d3ae54cb71d89877fefad758992891bfbc7104f2d5735a53faa536947485faac11a86141bc6129be1788e9d26880b005ab0122b0210b598f4296a46ccfaa5aa9d54df3504d2b73f88d1910fdd858027f0b12660f4465cb0690aa829e9321774e6c2a9ab8295130794c54640d4df16f1312b101ca0831aecc0476349ba6e3a45710daf7e3f17f0c0455cbeabc78fb8fc5b6ec1b0cf68579fc14732e3d6ea580a514f89ec5af84bb0962ff3086e8a2bb9da1072675a4b36ac5850865b82e90d978824fc9a8e3d65fd08341cb7559b956454143452be7d50f1c52e2bc075761ccedd29eee9613aa3aaca8ba6b93b95c73e52d16a1f8da6ac3eaee378fac54b3b41f08526b72079f989febfd2d598ec5a58129695179ca552b33b37d9fd669ab2f73109632db7681c11df27708204a6e2bb88eff9d0c177ef9ed04445f1d2bc05debffe322b3a76a6d7588835b954c4993e82d57ac7e7b24b091d5f9a5756b0b1850da4d3cb6bbee2c8870c29797927d7ba45f59a6bd2ca745c686101c5e97873785f35da72567f2ffa1c7112029c40d7fd1201c1880145b8193b1e95160cd828393585e"}, {0xa0, 0x118, 0x4, "3c140915c3f558a98d58ab886bc95cf9c261dfe919a8c35b70bb65ac5bd4074316c0fe64e0dc7b94ec5bb02fa9acad0138d419407aa43725a1eaa85a88637d8ac5880ae53c4ffada491b9c54cc54698fe57ac302bcb0642c51eee51d721cbaf36523829cf1be63ef8f285c6b3cbb7c8e8024a2a47e03afc21d7bb871673b96b19792e4175d6a26f47b977eaedd818cd2"}, {0xe0, 0x7d97ce593fdbec, 0x447e, "c8031c3d6848b28e01170786806ed9e13cc2537d8d679782231e56139bae8bad523f9dfdcad5c2df3f11291642262ea7570c1c8c298d4cc19b621e56655c4e70e384de478de286150ec831c18142386c7eefd31eb7551f136c66ac87540facc2e729b8d0028ea5be6df0d9ca53e6bcb5ab235e8b5782ed8f11d3de8824d5bf2d6a46b3d0f3fbcba98e64a26a32b0d209a3eaf9655574bad35e866b68b4847496697a3363def766bf431b2763a46ffc91baf96a08aff934edc08aced7a6b6cc85ef77873560a4c3d7dad00558aba37b"}, {0xe8, 0x10b, 0xff, "66872cee7e87f1e7397be8e6c249dba9f38bd4c44af89d08f95fd2e9fc58bc0825d22b5798ec208bf6508ffbbc6e58922512b128c5d47c1db6d15d719a1e0009b6a0266b6c073aca87f8ffb7d1e8fced7482464e2c2a84bbeacd70db6bf5bab693eb33359d36c7a17a4744b88deaceb3e0174369a0ad8d0e453c328cc5a8c8b5339f360ac69302ca386707e5adcc92e88a5c182a0952385335d121dddce27429de0553c4a8534d3da0da30b6dc944c3d7a234faae5dc8b01cdea55e75973cff556a20bf9c2f23267f879377691d35473e1edfb"}, {0x90, 0x12f, 0x0, "74d77c8ccecf0280cca452de7a193556426f13c5475057714f09671f479536b1b380aabe9833215aded799d57366849530d89b80bfc6007af58d1ee7eac5514d143741d5bd2513de9b21e4d7a2d7a57a9f80c027d19b4ff80c4060e8c046784385cde3b9399f9f52c21cd58aad296521dde1e7fa875f6d2b7703679306"}, {0xf0, 0x195, 0x100000001, "016070523542c9b4c170d0a44b49ed111745a41d791aa6883969b0aa4cad85e51bc7bfd03bb40e10eb02555547c5ce9e68d0eae8fb250ba4d75b91d55000a6e3bc1cf39e3f212b816bff606acaca687c7877f66b94e07f9d1bc9606a485bccdcfc673b00b7d8e4436540e10586afcf5689fe3900fa35fca72855efaf07fe469cf4c3020b0dbb63308d27b02d5b5903ba3463b159a15a2c029c7e0cfa214a6d1bb2f583e9ff686285894ea9929977cf98aaf85cdfce3819a56f05faf32adf715c4d62031228f6bd10c9fcce282ec2d8d00fa46170ae4b316b06af9e"}, {0xd8, 0x88, 0x6, "9f24e6004f56dc2f9d9a7004a4e05e14b091105b69d9e2c1da56123a4c423df9037aaa347a81e6bb7672ec2733be689625619961a1e2fbc6f4db44a98070d8c9302b426b5cb586677baa1f20031cd17670611f7a1726cddd4e477ca08764be5e6a427438ce5c167ca3c1db11d877d3878a7256c9b833a1dbb20e82f566462ad683d749204ba8d8a5a77be79285c51c6fa0eee2abd7680a196d8e957c221ce6c45d125f05fa60a9258029db237e69ece111617f0c84db6551078b10df4e81a12b7cf10411de"}, {0x98, 0x100, 0x7, "ebd98c0b622478bbb5a10bd0ed616bfe6b3dcdc99e876a663df6ab2116c76e80a46b8f9dce399c98ccd0a9fa672bae8abd96c7f1ba45304d00f5cb21b904ef5fcfef7753a490bfe789fd8a7b710ada1846e2a9e16aacdc289fe33cd0e4302137078f4717b2ec0938a7fa9a1193d1fed5950d11c4e25989737e4bbf001ba49141b7"}, {0x108, 0x11f, 0x200, "abb14536984d4307759f853b09c54ae4338ddc644454c459169172b67fce9cdc7149c908c95327183988d7ec249f20993b0b63a4f029608389fb5324532c61025a45955823aefeceae2dbd52df3b2dfd4d0d05e1ea69b737608b36f925270c973f72082b023ce3eb0ce5452f1b6f07885744ec350bfc8e20db3f92c835b2532e2dca82a2b2714ec86459c13c50da26775fa5ff6672c971c7dd5a1645f5f2bd0a8a708cb227f3ce5c614dc5272aacb59c8f5fe35ff0f3f357c33d482140383c6bfa7249cf58d9d92ddf687922745a141c0236f8151bc286d9b2d61cc9c3ae2c31922549308504287be8d861d6bc72e1a375604644"}], 0x16c8}}], 0x4, 0x20008800) setsockopt(r0, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000ac0)=@gcm_128={{0x307}, "e1586060921bff96", "dfdfee893fdafd4ce8296cf6d09ad9e0", "b5c8fa35", "6848a10a14d494d0"}, 0x28) close(r0) [ 212.571600] bridge0: port 3(gretap0) entered blocking state [ 212.583442] bridge0: port 3(gretap0) entered disabled state 08:29:03 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x7, 0x800000007fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x400000000000002, 0x4b2e) ioctl(r2, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xa, 0x3, 0x8) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x20, 0x40003e) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000440)=r7) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x194a) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000002c0)) r8 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[], 0x0) close(r3) r9 = dup3(r0, r8, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000e7000002000000000000001400"/36, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$key(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0201000210000000000006f6fffffc000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90b2bc791a93d1260cfcb71b779839a8713564f074461669c16c64aedc3c25152e01a8ce5141e33580d608bf181e9f9d2e98e88e508f32571efa7ae4630fc30eca5a3769370b5f39e26fec23cee7a88cbab031bc46152"], 0xdf}}, 0x0) signalfd4(r1, &(0x7f0000000380)={0x6}, 0x8, 0x800) [ 212.623768] device gretap0 entered promiscuous mode [ 212.638956] bridge0: port 3(gretap0) entered blocking state [ 212.645247] bridge0: port 3(gretap0) entered forwarding state [ 212.937281] audit: type=1804 audit(1562056144.202:79): pid=9036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/73/file0/file0/bus" dev="loop5" ino=116 res=1 08:29:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") semop(0x0, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semget(0x3, 0x0, 0x0) semget(0x0, 0x4, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x101000) semget(0x0, 0x4, 0x210) r1 = semget$private(0x0, 0x7, 0x20) semop(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x2}], 0x2aaaaaaaaaaaab88) semctl$IPC_RMID(0x0, 0x0, 0x10) 08:29:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") fchdir(r1) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) close(r1) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x111, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhost-net\x00', 0x2, 0x0) dup3(r3, r1, 0x0) 08:29:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x7, 0x800000007fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffffd4) socket$inet6(0xa, 0x400000000000002, 0x4b2e) ioctl(r2, 0x10001, &(0x7f0000000100)="153f6234488dd25d766070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r5 = socket(0xa, 0x3, 0x8) r6 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x20, 0x40003e) ioctl$KVM_SET_NR_MMU_PAGES(r6, 0xae44, 0x1) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000200)=0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000440)=r7) ioctl$RTC_IRQP_SET(r6, 0x4008700c, 0x194a) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f00000002c0)) r8 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r4, &(0x7f0000000c40)=ANY=[], 0x0) close(r3) r9 = dup3(r0, r8, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000280)={0x7fff, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x3bd, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002000290f0000000000e7000002000000000000001400"/36, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$key(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYRES16=r2], 0x2}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0201000210000000000006f6fffffc000000000000800000000000e000000100000000000094f40337ff6b4ed6cd69675e973e00003500bb7a7a2d00000000000000ff0000000058d52a000000bb00000000eeff48f89f48a0d44b9e8238ce8005ffff03000500000000e90200423b00000000000000400000000000000000000000002000d40470c90b2bc791a93d1260cfcb71b779839a8713564f074461669c16c64aedc3c25152e01a8ce5141e33580d608bf181e9f9d2e98e88e508f32571efa7ae4630fc30eca5a3769370b5f39e26fec23cee7a88cbab031bc46152"], 0xdf}}, 0x0) signalfd4(r1, &(0x7f0000000380)={0x6}, 0x8, 0x800) 08:29:04 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x103000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) [ 212.969377] audit: type=1800 audit(1562056144.202:80): pid=9036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.5" name="bus" dev="loop5" ino=116 res=0 08:29:04 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x8132, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000002, 0x132, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000100)=0x9, 0x4) mmap(&(0x7f0000916000/0x4000)=nil, 0x4000, 0x0, 0xf89608c5ea10fef1, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000040)) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000014c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f00000015c0)=0xe8) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x10001, 0x7, &(0x7f0000001400)=[{&(0x7f0000000180)="14c7f9668492b4312708a69e9cffc8e2a64e1043e09ebdc8d3329877af32d84a9447d8d3f46bb3d3ce833a681f31366ea90ee4836dbe1f0485646ae5d89734971ae8c8", 0x43, 0x3b}, {&(0x7f0000000200)="ece40d", 0x3, 0x800}, {&(0x7f0000000240)="7a0f4f6fd5d1642bc364b0175e30ed74f52b3dd8ed8742b8edd5f85b14ff2fefcff3bb9324106d4a9e9cf151a32c1801da8ab67b23b287ad9f3d344db7b75da2f7b7712f", 0x44, 0x4}, {&(0x7f00000002c0)="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", 0x1000, 0x8}, {&(0x7f00000012c0)="3e4fbade1ed1bbb28c15", 0xa, 0x1}, {&(0x7f0000001300)="67e5dee78702191e95d83d48e57488bfd3bf4571bc12e82e596e34", 0x1b, 0x7ff}, {&(0x7f0000001340)="93b3602c141d19e85ec4a1b42889b7ca56253e47a3d57a1d7a09afd54c44a1f50a8fa2d66046d8e14be47a88aa88bd3d5a0718e12d44ec8c632df4ba9d2baa12ba5f883c84c890d11dfb9d8276fc852b2f9f04d997700c49ce7d9d874c77dcc70297a7380ab3e9eb08e0aa6c4f7c094f7da99188d3118d11212f01b175eb15926c77c989fb5f3adb4437659d6c5ab968c434d67cdcd834b9495feb94995e76", 0x9f, 0x80}], 0x80020, &(0x7f0000001600)=ANY=[@ANYBLOB='file_umask=00000000000000000000003,dir_umask=00000000000000000000002,rootcontext=unconfined_u,measure,hash,seclabel,context=root,uid>', @ANYRESDEC=r2, @ANYBLOB=',obng\x00,\x00'/23]) [ 213.021623] audit: type=1804 audit(1562056144.232:81): pid=9083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/73/file0/file0/bus" dev="loop5" ino=116 res=1 08:29:04 executing program 0: clock_gettime(0x7, &(0x7f0000000000)) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x82) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000200)={0x2, 0x2, 0x9, 0x0, 0xdae424ba53981019}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000140)) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r2 = accept(r1, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) ioctl$SIOCNRDECOBS(r2, 0x89e2) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000180)=0x30) [ 213.070465] audit: type=1800 audit(1562056144.232:82): pid=9083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed" comm="syz-executor.5" name="bus" dev="loop5" ino=116 res=0 08:29:04 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x0, 0x35c], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x2, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000100)={@loopback, @empty, 0x0}, &(0x7f0000000140)=0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x402, 0x0) sendmsg$tipc(r3, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000d00)="9e56db2a86be3647a17b573bcfef63b399a9f51b5e6f7b6ca2e866ac1e85be0fe94a60eb9c501b67478ece694350aed7615282716d91f29dfba6d72fce", 0x3d}, {&(0x7f0000000d40)="768814641c750889099f2434aee2a478c45ac404f42658138c1a93eca3ab3886c1de1ee4e5009984b6a47b76515b39a8d56e1a94d057563a60930c635db4565c0124b3580006e1fc0147f8afed1b86cca2d1c32d555089cb7e7327c3cb3c08ac728449c651c69e223a472ce0f55ed8a2cb264f15705a44f820a4f497ac10cb6cfe2453926485ae32834651f59d59fd2a5b750cc60562e9dff274495922e231dfef29a98964f6fa52d90a", 0xaa}, {&(0x7f0000000e00)="d3de57eda81442161d32f368651bb75454a5ffd63693767d638e2644f4025d3a79b65c225bad4ff025292df378fbf369b9440bf2c1a67cd02be4a7ddda9c70734e1e5959c93e2d524ea40e0c76a9d9af5b1465f96364f6de5cf7c4fdbb9b5032774f979916eafc38463b2e02cd3b67e0482e146ed6025591d972fa7ae946d62ba2542a3a6aeb6d81e3e0ad25e2c56e7be1a28f783816b8bd3eeae4f47cb997fb2a68f4c5b6f14867ffe22ba5caf96d62f5468f531f", 0xb5}, {&(0x7f0000000ec0)="7e4b24d3e500dba3d9fcf24e11be5c440e38126b68e8356d8e8a6432761bdc46466b3705fe59748461c8f19218e7ec6fa115f3c672486555ecaee8f69ab6085474b34b8d1a25a9fd39fef5b8de7665f7023761366251147245c9bf4733de8925a3e431ad77f63442e587e945", 0x6c}, {&(0x7f0000000f40)="0fe785763f4b0ec14fba851841eb908103910e04ae82acd4095510f9888b91255a5c2ef2730a18812c09324c625a316584d1616393e92dbe5ba2db8dabfff8fe64bac98a43f76de3d642b4eeed754171ba6f8ddcaa5a090a5644fcc8bd63f161c40d4514e2e195655ce9b23d749b5688be9d4b273bf34b08bf2ab804e1faaa834aafdce68bcbab87e130d5de7cda1b0ebe6f89ebcacafea74f076e0bea1824bdc8c592d73f66d1a486dc60bdd16df5a45cde93efb6e7de3990a6365fd34d0aeb339d80ccca1162b728dabdc9154670e8f2509e173bbe213581dcb850b9b9c70c59de3f32", 0xe4}, {&(0x7f0000001040)="f0e605e6717901a5c72b952572a9624346724be894e596484fe4699b05d6a20ea2440d52850e98e5946abe1a09bc9041ac1b4ce4e08d4db196e4ed710078f7dcceb63a34ff223215f51c55ae08fdff10ce540a601ff4769d4882b7c4c9c9aea0821301a1b2c43e757561f3e10e7e4654a85d8c9fd7499ac43197e39c8055a54e73c39b4fee8964e0c18ca9b423ef7e5208b47b430b06b3c9a8d762ab589de5cdfb63d38fb16746f188e04174d9a2261cdefe31c76ef567d65454f99e8cb90531dff07e1bdde1ec6db6963bbf0dc0853cfd46da069b28bcdb77883d8bb8", 0xdd}], 0x6, &(0x7f00000011c0)="1b3336ae98e905c72a1d81744883a95de191ce8280068fd8e7d47b44e1342b842bc86c0b70815b348ba4021217bf8f81cae2f83482385ee9d664a791db9198b0d5fdb01b0b00728f964fa1a0032f1693030dfee59ef68454357f", 0x5a, 0x8080}, 0x20000081) r4 = accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14, 0x80000) sendmsg$nl_route_sched(r0, &(0x7f0000000cc0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000c80)={&(0x7f0000000240)=@newtclass={0xa30, 0x28, 0x200, 0x70bd26, 0x25dfdbfc, {0x0, r1, {0x2}, {0xffff, 0x1}, {0x5, 0xfff1}}, [@TCA_RATE={0x8, 0x5, {0x3f, 0x4}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x848, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x8, 0x63, 0xfffffffffffffffc, 0xa00, 0x5, 0x4f1c1329, 0x0, 0x3, 0x40f, 0x2, 0x5, 0x3ff, 0x3ff, 0x5, 0x764, 0x1, 0xbcd2, 0x2, 0x9, 0x7e, 0x1, 0x5, 0x101, 0x76, 0x0, 0x2, 0x7, 0x8, 0x2, 0x8000, 0x9, 0x1, 0x4, 0x8a, 0x7fffffff, 0x8, 0x20, 0x7, 0x100, 0x7, 0x8001, 0x100, 0x4, 0x3, 0x5, 0x6, 0x0, 0xa77, 0x7, 0x8, 0x9, 0x3, 0x7fff, 0x7, 0x100, 0x1, 0x2, 0x2, 0x0, 0x3, 0x1e9, 0x6e, 0xffffffffffff7fff, 0xe10000, 0x0, 0x3c194, 0x80000000, 0x2, 0x7, 0x7, 0x4, 0x2, 0xc08d, 0x131, 0x800, 0x5, 0x5, 0x800, 0x5, 0x6, 0xd410, 0x3, 0x1, 0x0, 0x6, 0x9a46, 0x3ff, 0x6, 0x50b, 0x6, 0x400, 0x3ff, 0x4, 0x800, 0x800, 0x1, 0x89, 0x4f4efc52, 0x9, 0x80000000, 0xb6, 0x3, 0x266, 0x3, 0x3, 0xffffffffffffffff, 0x40, 0x5, 0x0, 0x8, 0x8001, 0x9, 0xf3, 0x20, 0x100, 0x4, 0x0, 0x10001, 0x8000, 0x5, 0x0, 0x5, 0x40, 0x800, 0x5, 0x5c4, 0x1, 0x1, 0x6, 0xffffffff, 0x7, 0x4, 0x5, 0xc3d, 0x1, 0xf3c9, 0x100000000, 0xfffffffffffffff9, 0xffff, 0x2, 0xefb5, 0x2, 0x100000001, 0x1, 0x2ae, 0xffffffff00000000, 0x3, 0x1, 0xfe000, 0x56, 0x7, 0x9, 0x200, 0x5, 0x9e4c, 0xa5, 0x1, 0x401, 0x7fff, 0x7, 0x9, 0x8, 0x10000, 0x1, 0x1, 0x0, 0x438f, 0x7, 0x4, 0x4, 0x8, 0xffffffff, 0x2, 0x0, 0x80000000, 0x651, 0xa29, 0x9, 0x6, 0x9, 0xffffffff, 0xffffffff00000000, 0x1ff, 0xfffffffffffffff9, 0x10000, 0x7, 0x2, 0xb7d, 0x1, 0xfff, 0x80000000, 0x200, 0x714, 0x4, 0x101, 0x400, 0x8, 0x98, 0x611, 0x3f, 0x8001, 0xfffffffffffffffe, 0xfff, 0xdf, 0x2, 0x7, 0x2, 0xfffffffffffffff7, 0xffffffffffff5a80, 0x3, 0x54d7, 0x5, 0x5f, 0x81, 0xdcc9, 0x6, 0x0, 0x3, 0x7fffffff, 0x2, 0x401, 0x8, 0xebdb, 0x3, 0x5, 0x7fff, 0xcd50, 0x9, 0x0, 0x200, 0x4, 0x9, 0x100000000, 0x62, 0xde, 0x4, 0x9, 0xd32, 0xfff, 0xffffffffffffffff, 0x7, 0x8, 0xfffffffffffff298, 0x8, 0x1e3, 0xbfb6, 0x3, 0x8, 0x2, 0x3, 0x6983dba2, 0x1f, 0x1, 0x4, 0x800, 0x6]}, @TCA_HTB_RTAB={0x404, 0x4, [0x8001, 0x2, 0x6, 0x401, 0x4, 0xcb, 0x1000, 0x2, 0x1c00000000, 0x6, 0x1d9e, 0x5, 0x2, 0x5, 0x0, 0x40, 0x5, 0x2, 0x8, 0x100, 0x100, 0x5, 0x1, 0x3, 0x0, 0x8000000000000, 0x6, 0x9, 0xfffffffffffffbff, 0x49d, 0xfffffffffffffff8, 0xce8b, 0x7fff, 0x200, 0x7, 0x100, 0x6, 0x5dafbb5c, 0x401, 0x7, 0x0, 0x1, 0xfffffffffffffff9, 0x3ff, 0x7346ad4, 0x1, 0xf1f8, 0x4, 0x28, 0x4, 0x6, 0x0, 0x1f, 0x8, 0x9, 0x80, 0x45c, 0x9, 0x0, 0x5, 0x800, 0xfffffffffffffffd, 0x3, 0x7, 0x400, 0x6, 0x400, 0xffff, 0x100000001, 0x3f, 0xe6, 0x200, 0x1, 0x9, 0x4, 0x5, 0x1, 0x9, 0x5, 0xfffffffffffffb32, 0x0, 0x0, 0xd2e, 0x200, 0x9, 0x3, 0x1, 0xa5, 0x6, 0x9, 0x400, 0x40, 0x1, 0xfffffffffffffff7, 0x4, 0x4, 0x1000, 0x1, 0x459, 0xffffffffffffaf50, 0x0, 0x4, 0x10, 0x2, 0x3f, 0x200, 0xffff, 0x101, 0xfff, 0x80, 0xfd, 0x3f0000000000000, 0xfffffffffffffe00, 0x80000001, 0x6, 0x4, 0x1000, 0x24, 0x1000, 0x6, 0x1c00000000, 0x20, 0x5, 0x8000, 0xcd2a, 0x788, 0x2, 0x6, 0x9, 0x8, 0x7, 0x1, 0xff4, 0x2f2f, 0xdf, 0x7, 0x2, 0x7, 0x1, 0xe3, 0x4d6, 0x1, 0x6, 0x1, 0xffffffffffff0001, 0x1, 0xb995, 0x6, 0x8, 0x7f, 0x9, 0x80, 0x1, 0xff, 0xd38, 0x5, 0xfffffffffffffe00, 0x8000, 0x0, 0x3, 0x3, 0x400, 0x1f, 0x9ab, 0x0, 0x2, 0x8, 0x5f7d, 0x8, 0x80, 0x10000, 0x5b21403a, 0x100000001, 0x8, 0x20, 0x7ff, 0x1, 0x0, 0x0, 0x7ff, 0x3c, 0x81, 0x10001, 0x3, 0x1f, 0x4, 0x7fff, 0x4, 0x7ff, 0xfa, 0x7, 0xffffffffffffff09, 0xff, 0x0, 0x7fffffff, 0x1, 0x6, 0x7, 0x1, 0x4, 0x5, 0x2, 0x7, 0xff, 0x3, 0x22, 0x466, 0x3, 0x80000000, 0x1, 0x2c7a, 0xfffffffffffffffe, 0x1, 0x7, 0x1, 0x3, 0x800, 0x800, 0x41, 0x7, 0x8000, 0x7, 0x66ef, 0x100000000, 0xffffffffffffff3b, 0x1, 0x4, 0x80000000, 0xa1, 0x20, 0x0, 0x1, 0x5c, 0x155, 0x1ff, 0x6d7, 0x5, 0x3f, 0x0, 0x0, 0xfffffffeffffffff, 0x8, 0x8, 0xb2, 0x3, 0x5, 0x808b, 0x1, 0x9, 0xffffffffb65ea681, 0x0, 0x10001, 0x2bb8, 0xff, 0xfffffffffffff801, 0x1]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x2, 0x2, 0x3, 0x6, 0x5, 0x6}, {0x2c, 0x2, 0x8, 0x2, 0x5f, 0x7}, 0x0, 0x800, 0x2, 0xfffffffffffffff7, 0x4}}, @TCA_HTB_RATE64={0xc}]}}, @TCA_RATE={0x8, 0x5, {0x3, 0xfff}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x124, 0x2, [@TCA_ATM_HDR={0x30, 0x3, "6c12d4455ece3ae4616b59a53a881cf740dccce10d166b3514c8615e38ed83990baa4e1327fecf8d343f"}, @TCA_ATM_FD={0x8, 0x1, r2}, @TCA_ATM_FD={0x8, 0x1, r3}, @TCA_ATM_HDR={0x2c, 0x3, "ee23c1097b0a40aef5db7456a696db9d3f240b56bd4d70e7c9204ad66182638930314de5bc5673c5"}, @TCA_ATM_HDR={0x30, 0x3, "d77f9b2dea55a73e27fd86b4cc742b7038b30ac72f999b49dff3cc66b254f2a52f1b0b4518c3b6220211"}, @TCA_ATM_HDR={0x40, 0x3, "d260c0f47903a90561efa061e7d329c52678c49b42ac9a4c70f512a8908ce44ca1665d2c433ffea9f1b3a90d4f9dfee013a02b20f205904755"}, @TCA_ATM_FD={0x8, 0x1, r4}, @TCA_ATM_HDR={0x30, 0x3, "940efedb49a9c9b174b3082b09877df7df3f29fa9a07678cb4e00dc0eaa29e3a137ebc7273482da008"}, @TCA_ATM_HDR={0xc, 0x3, "90aaf48d31d511f2"}]}}, @TCA_RATE={0x8, 0x5, {0x200, 0x2}}, @TCA_RATE={0x8, 0x5, {0x2, 0x8}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x64, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x101, 0xffffffffffffffdf, 0x100}}, @TCA_HFSC_USC={0x10, 0x3, {0x3, 0x6, 0x7}}, @TCA_HFSC_RSC={0x10, 0x1, {0x1ff, 0x98cf, 0x800}}, @TCA_HFSC_FSC={0x10, 0x2, {0xbc4, 0x9, 0x5}}, @TCA_HFSC_RSC={0x10, 0x1, {0x3958, 0x9}}, @TCA_HFSC_FSC={0x10, 0x2, {0x0, 0x7, 0x1ff}}]}}]}, 0xa30}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 08:29:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="24000000180007041dfffd946f610529802000001f0400050000080008000700022bd000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0xfd5c}], 0x0, 0x0, 0xfffffdc7}, 0x0) 08:29:04 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x4, 0x100012832, 0xffffffffffffffff, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x1f, 0xe71}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0x4) 08:29:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:04 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x2, @remote, 0x2}}, 0x9, 0x22}, &(0x7f00000001c0)=0x90) sendto$ax25(r0, &(0x7f0000000240)="c5b07dd2d206e6f88b12b9b4b75ed5b8670eb96db25c43a5ae018cf5cc8a1c031e48a1e6adf0add0693cc2e75effc8eefdc3500c652e469e375a703e86340273fb5547f0d4e4082e704212d62239151e922fa531d3c50319b525899a9517328fb49189e888aced857c22069fb2bf2f4cfd4ee996402a59f5746be0b1657b7f9aa1e5b5f626a42e3a01165ee12ed247b3d3a23f2a64174008db5111fc1ff18ba60a2a0f935189707b414a1dc28788e9cd70e747c581a3584a9331931f19b1a8a55bb0e66878f8fdb379e812f5c8d99f8a3bf2e970c5", 0xd5, 0x4, &(0x7f0000000000)={{0x3, @bcast, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r1, 0x1}, 0x8) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) 08:29:04 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) connect$tipc(r0, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x2}}, 0x10) creat(&(0x7f0000000040)='./bus\x00', 0x58) 08:29:04 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200002, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000280)="67e97241bfe2e2679beae605f323855de76a205a8d07a363e2a5e1c2da1cc8c3a5e84b03017957c8d394d77a1b8a3a1eba9c282d07007e12e6c7a56538184e7a38c63e41cba3289d3f613bb060445543a9cbb8d10f0af221b21fb4e436d890c4e1d548e7c3108723ec46d940d34e32c3dc50a2ef56eb98e7f8187b367e449914d364c7ab1d831485d33717a9426d4f7706040c40f40b8b8db6704b5d9b144d4871c0460ee0dc7a8b99d35623953f24f91e7c4179e964165e2aa0c9a278dcbbc869535e78bacb29570b5c836815eca62d171c6cb265e63e6ec1d6142b0fde76a5d397ec9e9c3b78735019ee", 0xeb, 0x840, &(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendto$inet(r0, 0x0, 0x0, 0x400200007fe, &(0x7f0000000000)={0x2, 0x4004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='vegas\x00', 0x6) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x300) 08:29:04 executing program 5: rt_sigaction(0x0, &(0x7f0000000100)={&(0x7f0000000080)="c4c3955eb4a7faa2584e5a1c054498c4235d40bcad00100000fe0f0f05f3000000b7f2a4c403015e1500000000020f38055df4c4e2a1b6fc0f9d2ddbda0000", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x40, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000040)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x202, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000300)={r3, r4, 0x0, 0x1000000001}, 0x348) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f0000000240)={0x1, 0xf4, 0x6, 'queue0\x00', 0x6}) 08:29:04 executing program 3: r0 = socket(0x200000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000040)="240000002a007f000000000000ed0300000410bf0100000007000000ffffffffff000000", 0x24) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0xf, {0x9, 0x0, 0x3ff, 0x6}}) 08:29:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:04 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = signalfd4(r0, &(0x7f0000000100), 0x8, 0x800) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x1) write$UHID_SET_REPORT_REPLY(r2, &(0x7f00000001c0)={0xe, 0x0, 0x0, 0x0, 0x3f4, "0cf8cd6b849d8cbacfb17d31cacb42d1849dc275f887b501a710450f6162771bc7458abb7947651479495c540ee55fcc0a6acbef57046367655a615207317e5ad659a88201a25041ea2ec333d592cb9e6a4d55ca055981910b85280cf89d297df4724c69a42b0762551de48789bd2bd2d83881dc27ef520e1a1fb7b3338e214041644257b90c85eee8441eb36fdfb343bf2033cfd3e2bee365b869c998cee2abb7a363bacf6b578fa9322dd944611a55262bcbcc6ce7e7f5583cb6aa499b911f3019f30b02bace291b673ec1ac5aeffc413f982c542272cf990e991babf09c20f23a9ed2f7d4f8740c4c7cca549eef3b0a71a9e01b2e0be5f852596de2a261b6719cf34d616a8c9f09265a96e254b3423bc23f092b436bcc137e8abf71ea4446e2ac3ef624a8719a8dabc26fd96d63ddcbd024528c1401be5398b4f181c95a479ec4ae7cd04a3ff121d5065fbc35cdf95cd5394a8dda06a3d8a97f3ba9d40cf0535dbe52c10902be1e9ad707614825605b4c4b323cfa0d21ef74a676888e4982ef96d0f01f34867ee703c82345feddb603db029bdc12f4e3c1d16791f5b3415d8870b785feebb92f13104e9fd6d932686b7b6f5f2f75340b1c5abe4d6756a1e0237b2e9656fc4e4808250b0013e8caa03f608268c032f073c5403a3bb4386eef0e7e4b1bb3e800e444ee3bde5f02359436d37832422164a4a419ee8d641398d4e4dee6b361ec1adb80ba6ea8ca8ff2fa79f49eb55be87bc2fec92193946b390887035b19c90a571d9c36c10ea018e3285e22a2b4df14a9a54c070de8d56900f0e3a5bc3cbec819441986045b040591fddc706af3b3261b300a65f31794f84bdaf12940bee81994d65556da4906eba5908d15d2b7d9770aaacf64a9396ad863eda6e508c479a20e866b4bc8b55be85b54ecba8627f4839cebd94955d055c358b30fab5d033d2d54df1184043c23c052acabdd3bbcdf7f7cc5b53b1d463c005626dbb7e4148b36d7892801e2480a92297a18a4575585a80b6868bfd93f8e35280c0481b73b744620d9b7e4f3aa1b677b2d0f424e1efe71cb669daeb8d3ad42adec38998d479e99b10ed6d1f333ee7e69bfffb0ab529b49e173173765b8435bae22136d00a1702a1297293d8bceee83677b481f30af3b3bd9f02c36526cff3d38d563fcf49a88d789b6f1c9d26287c5a50a628c85d86bcaad119773f4e6fd66bc029ad0bdcb5d40c6245664fbd56b483a869d31326b0153e6a854df164c344a31883dcb0cf6604b11985691d383a6cdb62fbdca3895d97a61621f1f3d4a7eb52ffa189b3657723375bdc0e0a9120522bcb48949f5ebdd44d12d8890c0ae112fb0a5096a30fdc6e13e9b5f8c437e8e6260b27326e9210e9858c7fdcf776bd754141811e894778a0c27f36b30e31e3d6cec2ce7071d93"}, 0x400) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000080)=0x879b) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x2, 0x1001, 0x1, 0x7, 0xfffffffffffffff8}) 08:29:04 executing program 0: clock_gettime(0x7, &(0x7f0000000000)) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40000, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) ioctl(r0, 0x8, &(0x7f0000000100)="57864c7cb295bed8696d642937777da3ee1d0962e787d6adf08fd5b2f289e178a8296fb1f9f3bcf2385ccfccfc9a8430ee34638ce0bdd487e0ca497310685c44b52c03c7aec8871b6cbfe9e860ae42e27473ac18c38add674163297549734821004e339be5e64c87777594a328d6e91c6ad5aa921c1542fcda15fc883743d71b938d2ff2d01723d02ecec633c492082b55d9f2292a0981896e60fceb1f5f6de241597cc4d540e13c927ba92447174e69df7b31c6d0e9fe0b967be6d3") 08:29:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x8}]}}}]}, 0x3c}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x0, 0x2710}, 0x10) 08:29:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") fcntl$getownex(r0, 0x10, &(0x7f0000000040)) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/218, 0xda}], 0x1, &(0x7f00000002c0)=""/247, 0xf7}, 0x2120) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) clock_getres(0x3, &(0x7f0000000100)) 08:29:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)={[{@statfs_quantum={'statfs_quantum', 0x3d, 0x8cffffff}}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000340)=0x14) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000002c0)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffffffffff90, &(0x7f00000003c0)=""/30) r3 = msgget$private(0x0, 0x20) msgctl$IPC_RMID(r3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0)={0x4}, 0x1) fstatfs(r0, &(0x7f0000000100)=""/161) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="0212020005000000df2d0300170032000002004e2100"/39], 0x28}}, 0x4000000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000400)={0x4}, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={@ipv4={[], [], @rand_addr=0x1}, 0x66, r1}) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000200)={'bond0\x00', @ifru_map={0x9, 0x6, 0x4, 0x0, 0x10000, 0x9}}) inotify_add_watch(r0, &(0x7f0000000500)='./file0\x00', 0x2000006) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000440)={0x471, 0x1, 'client0\x00', 0xffffffff80000000, "f49e799a9a2d9592", "2a5442ca686989f4aec9bda5fb8e2020d549cddf143de1002af21630d65386fb", 0x800, 0xb679}) 08:29:05 executing program 0: clock_gettime(0x1000000000, &(0x7f0000000040)) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x101000) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) 08:29:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 213.776169] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 213.794877] gfs2: can't parse mount arguments 08:29:05 executing program 4: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_proto_private(r0, 0x89ee, &(0x7f0000000000)) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f00000000c0)=0x3a04a497, 0xfe5c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 08:29:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x47}) prctl$PR_GET_THP_DISABLE(0x2a) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 08:29:05 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x3f, 0x22, 0xc, 0xe, 0x6, 0x5, 0x4, 0x24, 0xffffffffffffffff}) clock_gettime(0x6, &(0x7f0000000180)) ioctl$RTC_WIE_OFF(r0, 0x7010) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x2710}}) [ 213.858730] gfs2: statfs_quantum mount option requires a non-negative numeric argument [ 213.869184] Unknown ioctl 28692 [ 213.878505] gfs2: can't parse mount arguments 08:29:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10122, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 08:29:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10122, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 08:29:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000200)=""/19, 0x13}, {&(0x7f0000000240)=""/104, 0x68}], 0x2, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:ldconfig_exec_t:s0\x00', 0x25, 0x1) fanotify_init(0x29, 0x141802) 08:29:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000080)={0x7, 0x7, 0x16e64664, 0x6}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1, 0x3}}], 0x48}, 0x0) 08:29:05 executing program 0: lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x10000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="167a22abcde99e47561d5069a2149733cbbdc0b5b86ec7035550167ff964a3c599de84e4f323125bed839ebbd2b4a509db09a679f9c6a0dc791b47ef966b08a86b4b4be24f726ee41e26ac23a28a513d227da3", 0x53, 0x9}, {&(0x7f0000000180)="b933b85f77308e01bbe19d6054cc00f0ce5c5b4c1afd9e3446132f87356192cdd9a27cc2893cea7ef92ae895ae2aa8f5d10fac7b397443ffb822632d849edf0d4f3c35df47339c7aeb9a8d36d426f78fa3de90f75a3d852cca243c9d833a7253c61a508097b647491741ecb9ae8775d4850bfdd0fbfee427a776df7f91628502a8026fd57be8dfd1431a9b093a7323e323dfeef8cde866b92d420913d304f6c089f7c2bf6e8b6d85569278ce440ff91f792291ea46b3ae7d521cea4301", 0xbd}, {&(0x7f0000000240)="34394aa099259ecc6dfbf0b967f53bd09111f756d5fe84a528038f12ac3ad86ff5a0c1583fab4137ff9fc602d6040be17ddf93e24e33c7ee1410c4f2c22e", 0x3e}], 0x40002, &(0x7f0000000500)={[{@dots='dots'}, {@fat=@errors_continue='errors=continue'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}, {@fat=@usefree='usefree'}, {@fat=@tz_utc='tz=UTC'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}, {@permit_directio='permit_directio'}]}) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000040)) 08:29:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x5, 0x400) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x5, "c5516cb08a134f037b848c4416f052826ff2a3873ebba7abf7cf0616b2298af7422ad2488d903cc2381b786f868bacdbed053c490d8cd1ece56918367aec23ca", "c3f60c1db2faca5e00a07bcb94e32acf269677429bda5fc59e7f43fa803a3635", [0xeff9, 0x2]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x0) 08:29:05 executing program 3: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$P9_RREAD(r0, &(0x7f0000000200)=ANY=[], 0x5aa78d33) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0xfffffffffffffd9f) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) set_tid_address(&(0x7f00000004c0)) fstatfs(r1, &(0x7f00000003c0)=""/140) fallocate(0xffffffffffffffff, 0x0, 0x7, 0x0) fallocate(r0, 0x10, 0x0, 0x10fffe) open(0x0, 0x800, 0xc0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) sched_getparam(0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) 08:29:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 214.355289] audit: type=1400 audit(1562056145.622:83): avc: denied { relabelto } for pid=9227 comm="syz-executor.1" name="UDP-Lite" dev="sockfs" ino=34854 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ldconfig_exec_t:s0 tclass=rawip_socket permissive=1 08:29:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x3, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x29, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0_to_hsr\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0xff, 0x100000000, 0x1, [0x8001]}}) r3 = dup2(r0, r2) dup3(r3, r1, 0x0) 08:29:05 executing program 1: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x101080) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x1000000000000000, 0x0) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x6, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x3, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) ioctl$CAPI_INSTALLED(r5, 0x80024322) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000001ac0)=""/86) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:29:05 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 08:29:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffffffffffff2b, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x707, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLOWINFO={0x8, 0x8}]]}}}]}, 0x3c}}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000200)="c0dca5055e0bcfec7be070") r2 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x100000010507e) ioctl$BLKSECDISCARD(r2, 0x127d, 0x0) 08:29:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e8fa5ed527df262c90ea54bfc906fd81316deb38022f147cb63f9b54e68fe411e14ffc0c52ba41bc9dcfd40b1bab15b9d7fdea4d6fbc59a79fafbba64be5ab8cac37334b6c80665dfef23afd50270b18b746d598f5457c"], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:29:06 executing program 0: clock_gettime(0xfffffffffffffffc, &(0x7f0000000000)) 08:29:06 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x80) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) r2 = open(&(0x7f0000000000)='./file0\x00', 0x111000, 0x108) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000100)={"ed3536d32373dbd03e2195dadb78003f21415f9f142a031f2eff271cfcc02b02ac7818e6e814859f5e9acb4d91ebe0a6335cd309bc552565b333f06946e6fd794c3fc0ccf9a777b543904bd560b82b3dc7b5e7aaf065c6c8857ef064f8542124d9cd14e65c8dbaf56d6edd17c4ae8c65ef5cc2c8d03c44561abbe7c64b21187821ca216640df5c896ff076dc55e65de2b7427a596ad622a8e14c6c36284aafa1f1df5e6b837e18beb0b22cba34cd276fef2be26635ee9fbeef0340bd0cf4576b2ca832d2ec25233e78857a7b99ee32c0ffe5b9d7e5c1eab04fa29c09fb46b02ee83bc1e973531b59901dc56b02eeb1434fcfc4b4521425f7189dab348db34512d705c91b4a25a14c436b722b155dac642c678dffa7b74b56ebc95cb39477a02d4721c07186dbd06957474da154c3fe6ccd50a1b525494f36ffa2f00ef75da3b1b63e4ff4bcdc0a0a9c8cc4b44a1c2fe43c5cc7e3b94081b88991c20fb2b05b1a93b24ecea309e0fc46ca1704375d1bcd415ce299ba93a56338dabe541dc8bbcd5afae7507f4088a1f22f082f370b672659fd44ac0013367f1eaf1570fad128d6cc1b58d8840aa0c521bd0834a07ba8275bbd09b676e00280d39d5859d15139d9d5d66a51280b02cbcece7ae591a4e1f6086720a6230513b781c9365fc564e5e5b98e6c97c50b6ad833b0653e27c1a6f7dd7ec190e626035af5b302f1f26eaec693b2f7b46e730ea4e2a02aefab7ddaf7ad1128ba630d58d0c1b36d285fbbbeef44fc981efc7a6e55e5fc70ec805811c86c1c7649e48c97ed6cd7e253e05653eb4e1b08cbf5176ec95cd6483933afa7a1d76ea5cfb5464559b305fc3815ac471c1a732feb569410bfd91f6b9e87b2ef7c5cf25262f8a7280ffc6de614c5625fc8465a43caae403303fd03284f3ffe6eef292d04a4a5a4a63cd5e2984f163485b36619c93e5477c979106a847528260eef8cb3c6493d4ad2254311220089c2a081f470a4654331d56feeb0b41c085db62936989e3a8e6c621d86b594c506a91c02c029cd61857f8f83a8f7a68b4623479d2833e8d76ee7b44b25a0e68d88d76397d73ce9440ffee5b40c216d36bf19de9df276182ca30d32fea7225d37e303e9069fe0e315df874cd1563c2e0617927bbed4fdd37de0e62bbef781066b323087f9032e06e99dffe5280a3243e542919aa2bb13d05ae01b0e8766080ad6ed78c17fa7a18af0f4579289c525301195c1117484a773d7a2a1eafc8935d2001628e0369d1c64d83ec8117f57490f3bd7c3cf2d18e7106914fe7632a6ee1120ace2b0252d7922c080afaf42c89997e36c4519c20f2efd837ed52f520bd37937258340a2a2db816a521e4719f05b165a5ea48fe2ded70a5ef9e8940d4aac05d2e5c32a11241de81e7b160e554d8ee5cbd16dd0760005d6ce75bcffae32bd67a05d6ef913"}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001380)="71e67a111fde54fe46b904832c8fff73d41196c3cdf8311cfc093a52a7d10000", 0x20) 08:29:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 214.949771] audit: type=1804 audit(1562056146.212:84): pid=9276 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir373430368/syzkaller.yB7k7i/81/memory.events" dev="sda1" ino=16830 res=1 08:29:06 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0xa00) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000080)={0x0, r1}) 08:29:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.stat\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x2080, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x20000000fd], 0x1f004, 0x485}) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000000c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x200, @loopback, 0xe216}}, 0x1, 0x9, 0x3, 0x59, 0x8}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000003c0)={r5, 0x4, 0xf2, "4bff4b5da7de46175e85d3200dc36bd959b459dc60b255ec753f34e335c66608c87c6b9c16ec25e918dbd4ff11d5bb1882f84650013d03dc5a2afdfdaa2cf715db4a2fd07b6680c91e50a04e2892b564ef56f49e2777830fc785269b8e6b7574c1614ddf0041b44ec6f63f2e2b11b539eba7acb40b3dcbd98e5ca1faa557465ef95cae46ac45b0c4084cb367b59ca600383ba5f6607867a81040ace093b0b9f8743556a1299265627974ec79bade94f64c506825c39377cf911a93634fb2d11dda9b40b7636c618f764db85dbca9afcbeca294cfe458775edbfe5ecbeee866b0a68f0e438ade5e7b70e4dd07fcea8eb5acc2"}, 0xfa) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:29:06 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80803, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x2000000000000009) close(r0) 08:29:06 executing program 0: clock_gettime(0x1, &(0x7f0000000040)) 08:29:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:06 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="00000fb188f9f3b4745dc74038a6d800cc2207efdbc5f9f26dc086061af23ecd9a8c9bf46bfc78354d419598894abf5e6e5dc02e2cd9286478c5bfec103d59dbdb0d24"], 0x0, 0x4}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x8000000000000003, 0x2, 0xefff, 0x1000, &(0x7f0000015000/0x1000)=nil}) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x102000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:06 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$inet6_buf(r0, 0x29, 0xd2, &(0x7f0000000000)="406f52bbd1972fd2ede0", 0xa) 08:29:06 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x27c, 0x0) bind$rds(r0, &(0x7f0000000100)={0x2, 0x4e23, @remote}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000040), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@random="abd53b0b72c9", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x2b, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 08:29:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)=ANY=[@ANYBLOB="46696c746572000000090000000000000000800000000000000000000000000000000000000000000000000000000000000000bc2d00000000000000000000000000000000000000000000000000000000000000000000000000000100"/131], 0x88) 08:29:06 executing program 1: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x101080) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x1000000000000000, 0x0) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x6, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x3, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) ioctl$CAPI_INSTALLED(r5, 0x80024322) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000001ac0)=""/86) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:29:07 executing program 5: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x101080) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0105303, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x1000000000000000, 0x0) syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x6, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r3, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000100)={0x1, 0x0, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x3, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r5 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) ioctl$CAPI_INSTALLED(r5, 0x80024322) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x3) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000001ac0)=""/86) dup(r2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:29:07 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) write$vhci(r1, &(0x7f00000001c0)=@HCI_ACLDATA_PKT={0x2, "2e2ee159ec985ad2fd72ca40ee56ee842275cd346b20cda3d388e09282a08f50826bf6051d1fb8a653dc0b948d41a2c58b6e13e2c51e90fb6c2fb2f687c5e01c192d62a9f62da3a0936f4592245cbb0589e43c7dc18cb4072f70aa1dfd2493d619b2b5f6f0d727655c69e34ad226d1e8c412cdc4f3e80dfc9a018cad71fd0e7dcc7df781cfb67fdcc8428f36ae80288479aed06144a59ca12bed74debcc10597ff8e"}, 0xa3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x600040}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x100, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1ff, 0x8, 0xed, 0x3ff}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x732c88eb, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) times(&(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 08:29:07 executing program 0: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x800) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040), 0xfffffffa) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='jffs2\x00', 0x110000, &(0x7f0000000180)='\x00') r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) 08:29:07 executing program 4: syz_open_dev$ndb(0x0, 0x0, 0xcc1) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000180)={0x0, 0x0, 0x2080}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getgroups(0x4, &(0x7f0000000000)=[0xffffffffffffffff, 0x0, 0x0, 0xee00]) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r2, r3) mmap(&(0x7f00006d0000/0x1000)=nil, 0x1000, 0x1, 0x2010, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000140)={0x8}, 0x1) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TCSETAF(r4, 0x5408, 0x0) r5 = syz_open_dev$audion(0x0, 0x4, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x2, &(0x7f0000000040), 0x1f) 08:29:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:07 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) clock_gettime(0x6005, &(0x7f0000000200)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x480002, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xfee5, 0x0, 0x80, "9fa9a2ef06d3a740fae1d779090b9672", "d0ca2e5742b9573752ca9b77ae4720ad93b0728e10b98d229d2f2dc6bf0c236f06c1fdf6875d91de3445bf10dc6c2431e8c10799270c09dcf6a68df850b641f60b718845dc2ba0736fbb7f2aad047d83d120da61e0741c9419b7d6477f6120e67e7635e69e5b3b23e2bc13528d0ce7d08414081f139990dfd2e10f23be584d9ae868020306c9d90b6ce8f17aa8"}, 0xa1, 0x1) 08:29:07 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000000c0)={0x0, r1}) mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x65d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000004}) 08:29:07 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) write$vhci(r1, &(0x7f00000001c0)=@HCI_ACLDATA_PKT={0x2, "2e2ee159ec985ad2fd72ca40ee56ee842275cd346b20cda3d388e09282a08f50826bf6051d1fb8a653dc0b948d41a2c58b6e13e2c51e90fb6c2fb2f687c5e01c192d62a9f62da3a0936f4592245cbb0589e43c7dc18cb4072f70aa1dfd2493d619b2b5f6f0d727655c69e34ad226d1e8c412cdc4f3e80dfc9a018cad71fd0e7dcc7df781cfb67fdcc8428f36ae80288479aed06144a59ca12bed74debcc10597ff8e"}, 0xa3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x600040}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x100, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1ff, 0x8, 0xed, 0x3ff}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x732c88eb, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) times(&(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 08:29:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:07 executing program 0: clock_gettime(0xffffffffffffffff, &(0x7f0000000140)) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvfrom$packet(r0, &(0x7f0000000080)=""/2, 0x2, 0x20, 0x0, 0x0) 08:29:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:08 executing program 5: socket$netlink(0x10, 0x3, 0x0) 08:29:08 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x84, &(0x7f0000000040)=[@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e22, 0xffffffff00000001, @ipv4={[], [], @rand_addr=0x1}, 0xffffffffffffffff}, @in6={0xa, 0x4e24, 0x80, @rand_addr="24ae48b3908ad0d6764e64bb67e4b28d", 0xffffffffffff39fa}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x80000000}]}, &(0x7f0000000140)=0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) 08:29:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:08 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) clock_gettime(0x0, &(0x7f0000005a00)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000058c0)=[{{&(0x7f00000002c0)=@alg, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)=""/191, 0xbf}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x2, &(0x7f00000014c0)=""/114, 0x72}}, {{&(0x7f0000001540)=@un=@abs, 0x80, &(0x7f0000001a40)=[{&(0x7f00000015c0)=""/53, 0x35}, {&(0x7f0000001600)=""/222, 0xde}, {&(0x7f0000001700)=""/233, 0xe9}, {&(0x7f0000001800)=""/188, 0xbc}, {&(0x7f00000018c0)=""/161, 0xa1}, {&(0x7f0000001980)=""/142, 0x8e}], 0x6, &(0x7f0000001ac0)=""/27, 0x1b}, 0x8}, {{&(0x7f0000001b00)=@llc, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000002b80)=""/75, 0x4b}, {&(0x7f0000002c00)=""/218, 0xda}, {&(0x7f0000002d00)=""/233, 0xe9}, {&(0x7f0000002e00)=""/179, 0xb3}, {&(0x7f0000002ec0)=""/238, 0xee}, {&(0x7f0000002fc0)=""/4096, 0x1000}], 0x7, &(0x7f0000004040)=""/147, 0x93}, 0x8}, {{&(0x7f0000004100)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005400)=[{&(0x7f0000004180)=""/233, 0xe9}, {&(0x7f0000004280)=""/112, 0x70}, {&(0x7f0000004300)=""/147, 0x93}, {&(0x7f00000043c0)=""/53, 0x35}, {&(0x7f0000004400)=""/4096, 0x1000}], 0x5, &(0x7f0000005480)=""/203, 0xcb}, 0x7fff}, {{&(0x7f0000005580)=@l2, 0x80, &(0x7f0000005780)=[{&(0x7f0000005600)=""/152, 0x98}, {&(0x7f00000056c0)=""/174, 0xae}], 0x2, &(0x7f00000057c0)=""/236, 0xec}, 0x400}], 0x5, 0x0, &(0x7f0000005a40)={r1, r2+10000000}) sendmmsg$sock(r0, &(0x7f0000006040)=[{{&(0x7f00000000c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)="8958ee6608406ee79e966c1f6bb8039c8c188a17975580aaee7155b935ef1425763c837427", 0x25}, {&(0x7f0000000140)="a92526c483d4d8511148f71ebf963d9b6de480afe698611682df3333cd8dd1d03b94b8aa6a9ca46178f7fcd9cc48e609de2f9c1331c711aaff5c50aff4d9bcfbd24da362a46032fc0c447f331047c0350b9fecd5fe23fa6b3f2a23b7789140a25e37134e2b9a1d64d51a1128c833865dd8947b4e24d9bf70b6d27dab2618d17d0079ec93", 0x84}, {&(0x7f0000000200)="85d82707b22a3d03ecea91def5dff8c209514d5add3f08a936e2a43df5959d66913948ec3fe56c4359e999cb2a65a3f6abc6c390", 0x34}], 0x3, &(0x7f0000000280)=[@timestamping={{0x14, 0x1, 0x25, 0xffffffffffffffff}}], 0x18}}, {{&(0x7f0000005a80)=@can={0x1d, r3}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000005b00)="f9f89da05171119f52a6361b1bf0aa1d0eb0dd705d364fcd0e51c1f754558b1ea0d3ef40", 0x24}], 0x1, &(0x7f0000005b80)=[@mark={{0x14, 0x1, 0x24, 0xfffffffffffffff8}}, @txtime={{0x18, 0x1, 0x3d, 0x8001}}], 0x30}}, {{&(0x7f0000005bc0)=@l2={0x1f, 0x80000001, {0x2, 0xaa23, 0x3dec, 0xffff, 0x69, 0x401}, 0x5, 0x6}, 0x80, &(0x7f0000005c80)=[{&(0x7f0000005c40)="5a4cd0900201ddfa33a4ed13e4cb9e27a73baa88ad254d213cb0f3b2c9e027eaff0d18f3642d943d6197c442c77367bc", 0x30}], 0x1, &(0x7f0000005cc0)=[@mark={{0x14, 0x1, 0x24, 0x91d}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x30}}, {{0x0, 0x0, &(0x7f0000005d40)=[{&(0x7f0000005d00)="bbce5119238b0699556345f210c0fd2fe2f31c18daebe946c9945194cd465430770c263e1dfd7a", 0x27}], 0x1}}, {{0x0, 0x0, &(0x7f0000005fc0)=[{&(0x7f0000005d80)="01e00ee5225f0ec380bd9833c49dbe66a58356a28735cb27ef63e0670e4d556a412b82f951664baa2bfcf5ca343259fcdbae43b31e2d18f5bcf204178e0d0d706717deb8501e48044a64db9ca53de3fb1110e7d24c0acc6152726b37e13ddd991afd06187b6034ad6fe9cdc33dca36cffdb85e31a37053d579507baf9bbe6d8731dbfb404c7e3e39d983d34b55024802a93c39779eb67d6e8c8b344637626ef8e1d5bd3df53a6ec20ba7d0de1e4ec5a2baea87cee93c9e08c6932d59f6b1be8f9337330c5d88d3be15277cd85a39e2e5ac607679f95abc", 0xd7}, {&(0x7f0000005e80)="cbef048072fd2d6ade27fe67a6e32731e82eab12650486ed492e08c4ae6f964a0eff5aeb72f9653e68a4c91bb0bf271a19930233f03011662445f9128d2ffdc3d07f4942ee0a15095d6249718f51da3feacf4dc958e0fe0fbe41e5d6475105d7aff32b5a1bd1704c48694704114dd1b94f67d7acd8fe6b27c301449f77a507f97f5334476092796186d4a6563a99041f13d30c9c986fbafecc8c30f2bda3d168e16b648f", 0xa4}, {&(0x7f0000005f40)="505e944cbf60fef288005820f8f4bd543f2dbd37a1d4c9587a56c38cee6ff8b77e7cffc4cdf8a9188e62d337fa7e48048e11f24eeb31c54f2d8664019f20e2e387b9dc1095edbbfd1857574b2fbec1cb63cddfcdec3c3ec1e37c0534c841a7ea9d2605f0b4bc0b0040f19c800782", 0x6e}], 0x3, &(0x7f0000006000)=[@txtime={{0x18, 0x1, 0x3d, 0x1f000000000}}], 0x18}}], 0x5, 0x0) listen(r0, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x0, 0x2) pipe2(&(0x7f0000000000), 0x80000) ioctl$SIOCX25SCUDMATCHLEN(r4, 0x89e7, &(0x7f00000003c0)={0xa}) connect$rose(r0, &(0x7f0000000080)=@short={0xb, @remote, @default, 0x1, @default}, 0x1c) 08:29:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f00140000000000000002000710f75ec15afeffffff0000000000000000", 0xe) clock_gettime(0x10000000003, &(0x7f00000001c0)) fcntl$setstatus(r0, 0x4, 0x40000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000100)=[{0xffffffff, 0x80000000, 0xfffffffffffffffd, 0x80000000000, @tick=0xffffffff, {0x2c, 0x8}, {0x27, 0x8}, @quote={{0xb8, 0x7ff}, 0x228, &(0x7f00000000c0)={0x3, 0x12000000000, 0x5, 0x9, @time={r2, r3+30000000}, {0x0, 0x2}, {0x1, 0x7}, @queue={0x80000001, {0x3ff, 0x8}}}}}], 0x30) 08:29:08 executing program 3: sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) write$vhci(r1, &(0x7f00000001c0)=@HCI_ACLDATA_PKT={0x2, "2e2ee159ec985ad2fd72ca40ee56ee842275cd346b20cda3d388e09282a08f50826bf6051d1fb8a653dc0b948d41a2c58b6e13e2c51e90fb6c2fb2f687c5e01c192d62a9f62da3a0936f4592245cbb0589e43c7dc18cb4072f70aa1dfd2493d619b2b5f6f0d727655c69e34ad226d1e8c412cdc4f3e80dfc9a018cad71fd0e7dcc7df781cfb67fdcc8428f36ae80288479aed06144a59ca12bed74debcc10597ff8e"}, 0xa3) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x600040}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r2, 0x100, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1ff, 0x8, 0xed, 0x3ff}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x732c88eb, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) times(&(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 08:29:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080), 0x4) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xffffff59) write$smack_current(r0, &(0x7f00000000c0)='lo\x00', 0x3) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB='\x00'/12]) 08:29:08 executing program 0: clock_gettime(0x7, &(0x7f0000000200)) r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000000)=@short={0xb, @dev, @default}, &(0x7f0000000040)=0x1c, 0x80800) fstatfs(r0, &(0x7f0000000080)=""/230) 08:29:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x7fff, 0x8804) r1 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, 0x0) getcwd(0x0, 0x0) quotactl(0x1, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000300)={0x1, &(0x7f0000000100)=[{}]}) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000040)) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000140)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) fallocate(r0, 0x11, 0x0, 0x100000001) 08:29:08 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) 08:29:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:09 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x20000, 0x0) socket$netlink(0x10, 0x3, 0x0) write$tun(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000000f97e8155ad0c6693d6c86517c46af6f0bc3a4f7023bdc6ce8acef7e990b81f431a210dbd2a7b8370fd3910694590c722b96e2fc0430bfeda6e5763b3ebb132a609bf66948146fbcfa1f176bac13837bce7f706b96e2fc53c0acd6908ee0a0b1f7fb4059db8c18988a0284c1a4c43b35e0e0278e28f911afe478bb5046609b8fd4d8f742609e9eae5359080231c6c158b54df256d6ec9dccde08eda53"], 0x9f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3ff) 08:29:09 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x3) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x100, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)=0x0) fcntl$lock(r0, 0x0, &(0x7f0000000180)={0x3, 0x3, 0x7, 0x8, r1}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x160}}, 0x40000) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x1, &(0x7f0000000040)=ANY=[]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r3, &(0x7f0000000240)='./file1\x00', r3, &(0x7f0000000840)='./file0/f.le.\x00') 08:29:09 executing program 4: socketpair(0x1d, 0x4000000000007, 0x0, 0x0) [ 218.446739] overlayfs: unrecognized mount option "/dev/ion" or missing value [ 218.476638] overlayfs: unrecognized mount option "/dev/ion" or missing value 08:29:09 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000400)="230000002d0007031dfffd946fa2830020200a00ffffffffa61d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b138a32052b44e099d881e02546dcda4cc7e6397", 0x4c}], 0x1, 0x0, 0xffffffffffffff96}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000000c0)="a53097226b243f6ddd398a2df10fc8994a7a7caa57b1f99e69d13816fe019f7e557cf8a10dc78169586f9e0ce76b2d120e0c48f84cd3c28ea0446ab39fbcf8835c74a7e6ccf4e41489f932f1222615d7ff4f8c12868ac879c7389ac9c11dd942f6c0f620237078c566dd5fbdef46cf4a7582e32142b391fc42c03ad4f0e11fab3119fc9e2056cb8345ec0523ac14b6cd2399a5bb288f45c4226417146bd3d58518ceb917feec60b9e791a209f867019a319330b99fb89167acde16396ff2054a6fb09b26cfbc1dbd07b7994fb6299a3ad8b4fd1062e1b7080ccc03dacfdf56fc", 0xe0}, {&(0x7f00000001c0)="29883511b1d42e4034dc77", 0xb}, {&(0x7f0000000200)="35efeeda69f6f492d2ab76bc7d7ef1fdb106d00ba22e9141c281e823a1d96ae4ee1a01d4dc2ab44bed209c89c292503501defff1f0cddb566498a0441ceff4e7e44a7be6d1ddbacdcb6d8b949ede45b9b0f13ed7884b4665afa27cb872658e19f2315a282b555121bf6a72033c94c7121a708f8afd6f20040cd557c3a2d22a4d23ef01e08732e8", 0x87}], 0x3, &(0x7f0000000300)=[{0x30, 0x0, 0x5, "be74b45b32f88a39c591539970a6ff9f59a75bacc378c9ef7f3127012c"}, {0x80, 0x0, 0x0, "94cc92ce579c493a88c2368bf24b12384af79af663151dae0f6f66b34034f74c71f0afda5172d41fa796ab7435efcd2854db96e0b511fbf7944d0276051fc7f559d395c488776eeb203b356b6300e0c80a4a37a17888f2c455ed861d76bc023aaf09f472c0c6d6fa962c1ed2b859"}], 0xb0}, 0x4080) 08:29:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 218.877644] Unknown ioctl 9216 [ 218.894196] can: request_module (can-proto-0) failed. [ 218.921515] Unknown ioctl 9216 [ 218.947264] can: request_module (can-proto-0) failed. 08:29:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:10 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x0, 0x40a00) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000340)=0x4000002, 0xffffffffffffffba) r1 = semget$private(0x0, 0x7, 0x204) r2 = add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000440)="87be178898070a7aa14b65dcb53cd811187c4fe545398357d30c29fd386ae6fc1dadea92ceecfd83ccbeb14657743d84eea559228cb9f8eea618bb8cd54f86d47f41dbb76c2122a370c233760d994c687e7d8321d2284a269759f86a10d6227d327a78a1aade9ff4d69115044178ee54b9b8c57c38a7d2bcdfcd609a97884fdc7fe4c3ea76993e48f0872194e1bf48d317db7160", 0x6a, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="faf64b81296b4c60daa9bc542ab9277e541f86a69c92f3e08fc7810ed735356e5ecbec7f796646dbcc44480de358908a39d27181cc02a8932e6e89bc505105566a792fcc1c5d85d942faed1a55c4213d8e0f51c98dd7b51abfbc7c1c5552e35ba021efc86faa1f3d0f9dbcb11ba91a7b148da6f519e7ba42f9e7be6f3f05f1121fdd74973c81afbf7db88450744e4aebb2d8a83f1e2a6122632122b32872dc85bcb9419f749e846419062b96ab2cb34507156b7ab41a33377470768db7d75a25cacc31e2b3326a66b9722a6f6dedbf1f", 0xd0, r2) semget$private(0x0, 0x4, 0x400) semtimedop(r1, &(0x7f0000000240), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) 08:29:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) flistxattr(r0, &(0x7f0000000180)=""/30, 0x1e) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "3ecf0f5074e53a754a1e7e906c39652349128653449aa6567ccfee52ff645483e020f57b59fd03474afec1b09a1fdf812ccd6a30197b93208f0a2fdc14c515bd92d32b281dc33d2f9950cf8878d6676ea028e6dba916bcf6028a1e3e4477882aca4b9db9f9cc7c4223fa858d9612469f8beb85bd4c8bb5b7165f91802393a8278078e0ce61e9423e71641b7dcfc94a41191931658d4cc100759040e391ee5714070eff6147e81d67fece244bfe858c03d88d91ca3b57401d26"}, 0xbd) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2441, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000100)={0x7, 0x53}) 08:29:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="e195d3fd7b4f53e2e237ff0134ea9bb6940c4eb33f625c59c55e1b57874d41d6bce1fe60a4b91c54e3a2157467ca10d0efb35d80740eac672ada5ec548afce5e14b2ad4113210c878ca2f4058afee15e78ff2af7f277c6393bc9d5b0f006f1539aad879b686214d97cb3853e757d87c6e17d708d7bb4dc03c806c407f2eee1fab6b693f21da0c7ccc9580bb7005688f1f5e1d5b615a0287dd588a3ec0deed40beb56dbf5364d18ee5eb8df3569474c244d9cbe24d87493c3246ad77a341615b0b41fcd7c056d5a13ec3b65f72deb029228768fc2752d75b9328d77788713b98a63", 0xe1, 0x800, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff19, 0x0, 0x0, 0x101aa) 08:29:10 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000040)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 08:29:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) fdatasync(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000380), &(0x7f0000000340)=0xffa7) r2 = socket(0x0, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@ipv4={[], [], @broadcast}, @in=@broadcast}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001b80)=0xe8) ioctl$TIOCLINUX7(r0, 0x541c, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000002c0)={@remote, 0x7e}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x5, 0x0, 0x7}) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000100)=0xff, 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f0000000180)=0x7fffffff, 0x4) getsockopt$sock_timeval(r1, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)) 08:29:10 executing program 0: clock_gettime(0x6, &(0x7f0000002940)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40e00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000003c0)=0x10) r1 = getuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x0, {0x10, 0x1, 0x6}, 0x28, r1, r2, 0x7fff, 0xd84, 0xeb, 0x1, 0xf9ca, 0x101, 0x9, 0x9, 0x8, 0x7, 0xdcdb, 0x8c14, 0x9, 0x4dc, 0x2}}, 0xa0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x7c, &(0x7f0000000240)=[@in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e22, 0xc2, @ipv4={[], [], @empty}, 0x906e}, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e20, @rand_addr=0x5}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000340)={r3, 0x9}, 0x8) 08:29:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000280)='/dev/snd/seq\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0x2fc, 0x0, 0x8}) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x204000000bd, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000440)={{}, 'port1\x00'}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000180)=0x99e, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f00000002c0)) r2 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 08:29:10 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x402001, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0), 0x4) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x248880) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x2, 0x4) 08:29:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="6c6f676fddeb7e6b2c00"]) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0xc7) sendmsg(r0, &(0x7f00000007c0)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x3, 0x3, 0x3, {0xa, 0x4e21, 0x6a, @mcast2}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)="10ccb728a80af177859d4c884d242b7baec9b97eab313a27267bcaee54424dfeeac1bb5a7a94d62cd345a806adbd673df3de62466ed8a31dee41fe0e74afa13647ef4347f6bd878a829b3b66d72804dd98ca381cb9743c56f75dd0db0ebb920e90f980cb569c9ff5f796b474283d065dc2fe48e60f2b0ad9d0965e59958b", 0x7e}, {&(0x7f00000001c0)="e1df63e6666f51a37909c96b51ca04d8d29c3f14184691d509b2f144d515866875470556148bc286ddd83cb8910365305905c384966b6ff26b4b160f21b6b30eef8d6b01b0d6b9b339ff37bfb44083209ff3047d64bb59135c572f8e5a21bec1c9a52ff22429e9b0895be3cd8fd2f9b0db3483d6a6561e6cb717eab6c4558b07e204c10e02a301f286262e2684cce9cb52a2", 0x92}, {&(0x7f0000000280)="6a9631a1f22f2a62999245bf99a93109b2ae35d2e3f4c8b30895aeb91fcf0c28d5e94de0cc35a9a1c3f23cd43ddb4698cf9694b57a3ad84a60923d3843ddf57d59f0ed9674b71a5c67795a20901a992901b70bd36199e2d3c284fd72f43782ea8fbd95be627dcd34f407b44aef3dc8e4e21f79f91434e1387874c966eccbb9c15ca69fbc6867814a87334b25f7eadcd33c1f0669cdd65c1b504a9c7d25fb252390902fe0f0c5", 0xa6}], 0x3, &(0x7f0000000340)=[{0x50, 0x11f, 0x200, "c6c779f0f2f4ad8a66e428e1c91672e0a25b0dbb9f8cdf1a0f8f34076ac0754d8131a691ad5d9465928591c568fa90c8af3fc1dc8bd52623dc8586276fbb"}, {0xc8, 0x10c, 0x1, "4354ae2e86f906b38f1415f1f3eed15167a2965d9daee0665c4bc3e7360de334e77e89350aa449c840e84ffaf128af44391f565f918800bf0a3f69d7f1ca0828f963fd7ce3af3ac8715ef561ebe7e7f5de8e391ec1dc45d71542149e3c4cd4512733d5c1b5db2fd2ad45b8cc6fcb581662023ec5103b3571e7e616915d156b02d061780889e4836fbf630caee388404cde41da233f8f852720fe8341b05e1829337cd745db92ee2ae0441d487c98c5198826"}, {0xd8, 0x13f, 0x4f7, "ba090b622d1fa62b5f56624550036fad9333931a4ab33e9b21d4e61eb523c18178dc8047ddc2c837fda538201a426ac249576b5fc122b4034672f645188f289c9549256f00a40acbb032c76c657d53e6ed3b3989d32f07196e58a92b65c3f9c5ecf7cf9e2726f0f2da5a36cde471d96c039a7643791b1cd2d0987eceb0f036401656dd8cc6ec432ae6f36d0a1a7f8a2ba3677c2493c301696b92527d26808069492375d71dd5dcbecf45fe8387fa16ca8a69e3c480666588d997a1426443cf736e"}, {0x108, 0x100, 0x2, "e5019785dbb2e1d34416adf8a7eaa460e2313a74b5923d9bf7ff82408e9ddbd95fd03407dd7027af547327533854cb672882ae468962224df7862f961fd6e3e03b6467228b30a2f382802b930c71e421b308e40d6cd62fddbbc66570aa2978f51005241ef098de942ccae35ae7c45c2136c850fb32303b67e09db0f50fe23d59cbd6e280b4a6401ce46335c81dfabea5df51d24aa535af04ae1a2c2f3cc3b9fb38c43bf5f80130ac6d1c2059cd82a037ef9c5f6a029ed5fd2b3ff2b9ddf85da6bea1ab36775eafd2479309269cc51b98a6b15fc9ae1125aa1b0c38a9b5f4583de4b91fbcde1e172a8ad222e0bc13cbb37ae601113021"}, {0x78, 0x13d, 0x0, "baa360fc6f700967179315bce11ede659402bf621b9bb575a35992d28b56c1bf7393776e82730d4197decbe9af2b87030ac9934b578101b8e01fa820237d8b85ed0b999d57bedf6d46277deb4ee30cc5df2b1415266341e33842f0fa256d914abf"}, {0xc8, 0x105, 0x6, "5a87901e4482fc63cc2accbf0d0e01a3645d213abeef344f4c33bae32bcc49100b3b8247f44dde416fb04c7e1183dcf37d5120ea305542f73868421ef8cd6bca5e97a019eee7fc7771ddb0f44adee990ca27d8570adeca2d4cf5405dec61a7bc236b54ebd631d3d30da8d541473714f24df8e3050c2eb2af9c4d5f34ee3c3fc3244d01684a7d1982cb16e6c8b1f813d3966e02805f57db7e33bce517ab3fc9a230ef2f568ccc98fbb9b6dafb37f6ab4279"}, {0x38, 0x0, 0x5, "df3f2f79760dc52525097c413fdddd9be35a91e21d55ae11e833b2811ad454fc2f1c02671e68"}], 0x470}, 0x4010) [ 219.705471] syz-executor.1 (9510) used greatest stack depth: 23712 bytes left 08:29:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) fchdir(r0) 08:29:11 executing program 4: r0 = socket$inet6_sctp(0xa, 0x2, 0x84) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x400000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r1, 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) 08:29:11 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1000, 0x200400) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x5, 0x4) clock_gettime(0x0, &(0x7f0000000000)) 08:29:11 executing program 5: r0 = memfd_create(&(0x7f0000000180)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0x0}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/151) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x20, r1, 0x1, 0x0, 0x2000000000000000, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0xfffffffffffffeb7}}, 0x40040) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 08:29:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10031, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0xffffffffffffffff, 0x84) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x118) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x40000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x70, &(0x7f0000000040), &(0x7f0000000100)=0x4) r5 = dup2(r0, r2) dup3(r5, r1, 0x0) 08:29:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:11 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000140)=0x3f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x900000000000, 0x9}, &(0x7f0000000100)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) 08:29:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) bind$netrom(r0, &(0x7f00000000c0)={{0x3, @default, 0x5}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x102, 0x0, {0x7, 0x9, 0x0, 0x5}}) r1 = msgget$private(0x0, 0x2) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000200)=""/4096) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001240)='/dev/cachefiles\x00', 0x402000040, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 08:29:14 executing program 4: r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(r0, 0x250, &(0x7f00000007c0)=0x1) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) ptrace$setopts(0x4206, r0, 0xd59b, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpgrp(0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, 0x0) r3 = geteuid() getresuid(&(0x7f0000000240)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) r5 = geteuid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) getgroups(0x2, &(0x7f0000000640)=[0xee01, 0xee01]) r9 = getgid() fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="02000000010001000000000002000200", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r5, @ANYBLOB="0d000600", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="040004000000000008000600", @ANYRES32=r8, @ANYBLOB="08fece496cab614bdd8969396bb8389e", @ANYRES32=r9, @ANYBLOB="100042612047d0f8b05ebfbd321440408c020000000000b17f50b9c0e1dbe99edcbcb462a1ca298d5f616a055693d1af63976b70215c143a06bd73c7bd46acef6600ad26ac52c85199b13062b399d336d76bc076274e604d9c180cb24f5c19a38a6e8838c81754a018f5d90e0a30a022c6d3c4a055c3b966131a94a4f07b98c2eb9274f84398326ab9"], 0x5c, 0x1) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xb2, 0x81, 0x9, 0x9, 0x0, 0x2, 0x404, 0x2, 0x80, 0x7, 0x2, 0x81, 0xff, 0x7fff, 0x1f, 0x100000000, 0x0, 0x80000000, 0x0, 0x5c, 0x1f, 0x8, 0x1f, 0x7, 0x1, 0x101, 0x3, 0x4, 0xfffffffffffffff7, 0x187, 0x0, 0x4, 0xffffffff, 0x2, 0x5, 0x1f, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x3}, 0x11048, 0x78b, 0x2, 0xf, 0x9, 0x5, 0x1}, r0, 0x1, r1, 0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) r10 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000380)={{0x6, 0x7, 0x9, 0x6e, '\x00', 0x3f}, 0x6, 0x200, 0x80000000, r0, 0x4, 0x80000001, 'syz1\x00', &(0x7f00000001c0)=['security.capability\x00', 'trusted\'securityeth0*\x00', 'wlan1@vboxnet1\x87-}^\x00', 'security.capability\x00'], 0x51, [], [0x4, 0x8, 0x1c]}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r10, 0xc0305615, &(0x7f0000000340)={0x0, {0x0, 0x4}}) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{}, {0x0, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 08:29:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:14 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1ff, 0x8000) accept4$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x0) 08:29:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:14 executing program 3: lsetxattr$security_selinux(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.selinux\x00', &(0x7f0000000940)='system_u:object_r:iptables_initrc_exec_t:s0\x00', 0x2c, 0x2) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/member\x00', 0x2, 0x0) msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="e1ffffff0200fdff"], 0x8, 0x0) r0 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x80000) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) sendmmsg$sock(r0, &(0x7f00000083c0)=[{{&(0x7f0000000100)=@can={0x1d, r1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="40d99800cf5222f8b083f4322161d1ce86828bd0bdc8ed76f87adcd24b01ef4daed8aaa1b2bddd473a2884de09c4a66a4aa04627031e2895254a9282d203b1393caa1c237df5a51884239b18741efcf9bc2f77712066e93c8fc0114233eec647c2895c51294cdcab53", 0x69}, {&(0x7f0000000240)="322e90fa0ead71786a870ab8461a1c8627785450eb761a68aff89ef144bb9cb75bafdfe7e57a67bf9b41c1366fd76d0f38ae675b1036f9d8b3ea78a91ce41faa48761d141d0b", 0x46}, {0x0}, {&(0x7f00000002c0)="0e5ff23d89dd67f04857080bf1c1accfa61cbd56c5ff57838aadd6178433a3f23bc768044218649c5a4c2ea23e72b5f6e990dda410676d28a95c1c42c148bf30b0bb5d29ff57faf8bc975d714d403c336696260e25b3304496f0ecacb51d8dc6d754e27c7e6be7f32568f7298b6f176f4923bbf3a5c1cb32174edafb5657849d323aa09618ab9c93fe0794dbcfea3aaa1ae13783dc7a6df9154e59582c93e4a8e64d7c700d0923f94d6c904e1e08cbda1e2b5de8661ecace", 0xb8}, {&(0x7f0000000380)="80f09f2bc2e2ca1b307019c7f318717c9991b49ff26eb926e327d15f19ccd8de3b7056361515ae46f54cc04f21a0aebb74feecba137a8f18baa5ace5371702654fe3d3a736a7f55f3c7f5bec8854c9894cdff5354bfefca6e6d966a665df2dd0c82927bcfbf77028a14926684bff4066a04da43a8188e655b890089b09ee650ae0b8dbf21d8f1b1a8a926cea39fe889fab07898a44cc89ac9a4cd3af5d19e43ea3374b0a9e24f1ee9ad10a609861fd83e0781f0d0ec92cf47e28a960a508", 0xbe}, {&(0x7f0000000440)="b65603552b2ec9b05d92d65f3c3f9f", 0xf}, {&(0x7f0000000480)="971ff64f65a0cd6d9608a34c65d3377b1de8fc7209aa7916b8d639eee759277eb6dc586a41ae926fdaf280d0f8610ce6f542d298072f34670e177c54046033ad7d73fd0a4ef93935bf323db9b8a49cb0dc3517b94ba9b62a82995576f401b866fc4f9a394a5f696bbd49ddcf252d9564d5f6a33aa15aee94722cfaa15fb6782fb0528ae20da56eadec", 0x89}, {&(0x7f0000000bc0)=':', 0x1}, {&(0x7f0000000580)="ffee9119182d0e51baf6515648397821c5ae3fb20ddffdf9064f3079a8263b8f6670f05f5465f03e6ff71a255ee394a2549c3a733bc5d20889fe560a69bf3abd4199a4bfc63577b3c3f8b522f03064e31ab1bae148b399298deb46371508131c1148d6323037", 0x66}], 0xa, &(0x7f0000000700)=[@timestamping={{0x14, 0x1, 0x25, 0x400000}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffff8}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000780)="547864f7c865529f01beb21473af847f23812f5da95a4fc6269b9c76b5448e313be6c01a7962005a77f983d023563e658e8badf1ff9a266557505bb7b74aafad9ea167a5d5c8be3ad295878ed75af7164e3c2823232497e8afcf20959c0ee29c17aa57688d650ab56e1e4335613ff32200220879b862ee86b8214f56a4f2921da5127ebe36a00558129accb656586da7b8fc40fe6d6b87ce2f91b990ae37db5c86a859a04c1aa6feeceea612f5a3e000091af911d57687fa7f7441b73bd8fb9299b0ba21bf90ddc8e05648b46f0940954aa59f9c1d19a32686eb", 0xda}], 0x1}}, {{0x0, 0x0, &(0x7f0000001a00), 0x0, &(0x7f0000001a40)=[@txtime={{0x18, 0x1, 0x3d, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x30}}, {{&(0x7f0000001a80)=@caif=@util={0x25, "a4aaa1ec1a81a2e8b4b632ea7a237f22"}, 0x80, &(0x7f0000003e40)=[{&(0x7f0000001b00)="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", 0x1000}, {&(0x7f0000002b00)="6452a7649da5df2e2b071d147522179939f043e95f72f28d35d73c9c0bc8a59c41e3b9e0eeacb4ebe0bd429df4633969d605a46fb11510798e2c8f37b0ec2ec7a03fe1c93b16c2b2e957cdb0499dd30ad5b2a9b4b625bc", 0x57}, {&(0x7f0000002b80)="f90f1b56681eb10a524d32cbe5319a5247e0d8e1471499f0b79bb3210dcb3155c42287d1c8976c08c9d922ea895b82471aab6efb756a9a09c0c124c16305dac2ee76c8fd367936b03b056e8c0a4de1b00fe9a8f9182eb98992841975b3e8b65da04645bdbb0ce5e2cc8dbb2264a71ab6267430b62cb7efc3713c22236dae0e94f156f6bf91fae2217a08e4423598304112adf22c79d93c26ea67bf0dddcc2b1ce66f7de7047a01f4a6d875c646f88c51d67f7682f7866683fb0306d3092349d9c4ff5aff160a9f94920093e59237ec632ad0faffaece89c1d2dfd9caffa7c42e197d186b8a5b39dc2554d0ba822380b1435b5bdf284b11cd42a199abb69a32", 0xff}, {&(0x7f0000002c80)="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", 0x1000}, {&(0x7f0000000ac0)="af501254af9b8050e6aa05f73c1a8db63694fdec8e1d4f180f9ab8017ceaebfea68cf024be0dd1ea8fe4ffc96899b12bd80f17c1915f0ce35f8e351db80b0f1d51a480e536c98c9d1097920d741649d5897d98f83c4fe224d6ae8ecfcb9d85656e78b70bb38805ee57b7c3bca27cf1233c124ddc267c75e5c737fe2d7c98b35400aacb7bde499d7036683455d2044c3d3700210aecf440baa2446124cdd1d348ae90565dec669472de49ed4bbb2bec8748b5804a19473a5a94d59f2e05a9b26d4a94b14e44fcab11b1c2cf8250a042b470d6c9ecfc4ce91c65636c0bed0cdb47858ab8021596940c5ece3b63", 0xec}, {&(0x7f0000003cc0)="86ffed74d4346ce50dfc9ca01016b900264fc9c1c86fb3995901e20f06757183265a05f8f6f16b33371285f047859018d65cffbc10c334cfba1b5ea91afc5d011a56fb58df26f67afee87dfdaa97631c07d0194c81afbab2ece52f56ec4999f9c05db8be21f85439c5adfc9d944cb8a5", 0x70}, {&(0x7f0000003d40)="6b8ef962409f365be0380edf4e665bbeb64989bfbf222f0512c0dace6293ebf713d90c9acdb5c563a35d1c86aaec090b9e3c17496c6e46efb04a27cb7ed0069a567879ad1f235c5e459995a41778d68eb4ea3690886e0712e71f58094cd30275af9e8dee08962b1cfa9c566befc274822ec56ff3d911816b19719c747d3e583fac53eb1efc29ed2d9c7ca62a65ad172031c060ad4c0d9c2c00e32561dcb0eaa91385caf32e7238a6efdde25356f1ee7a852b5420427372ab1fdf33bb7aaef75c2013437f41eb5285e8425374f18a96", 0xcf}], 0x7, &(0x7f0000003ec0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}}, {{&(0x7f0000003f00)=@llc={0x1a, 0x204, 0x1, 0x20, 0xcf8, 0x2, @link_local}, 0x80, &(0x7f0000008740)=[{&(0x7f0000003f80)="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", 0x1000}, {&(0x7f0000004f80)="cc23be7f97c78719ea5e7973266e483b75545ba55aeffcb8fb16085c47eedfdba466e4a0496fdd7d25dbf2fffaf4243776c0bf830b5ae469c7edd405a3d601106d75e8d521e4b2f09e807730421d3205b4e59ab903b7cee48cd8ad53b2eaef6b6bf72ecc3dae6a964b63866d2fd72dc14f3d1b5779b100f6cb1279fe7ac4edc2b9c51a573afb5fe1ef2fae9df24ce08df9962bae1bf1333cd6dfe9a1ccf09c694d870090d7b1ce2bb2cbbfee7156dfa5ecea05fbe854573fd195932137952352f95a52001be83ba50872ee360c6ad5d86f7b44794792c08b428b91eb85e0afbfc4f9af", 0xe3}], 0x2, &(0x7f00000050c0)=[@timestamping={{0x14, 0x1, 0x25, 0x72}}, @mark={{0x14, 0x1, 0x24, 0x219}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffff7}}], 0x78}}, {{&(0x7f0000005140)=@ll={0x11, 0xff, r1, 0x1, 0x9, 0x6, @dev={[], 0x2a}}, 0x80, &(0x7f0000006380)=[{&(0x7f00000051c0)="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", 0x1000}, {&(0x7f0000000980)="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", 0x124}, {&(0x7f00000062c0)="e42aee67c34d02316ac75806d8864d38ac66aaf0750a987c397d2d3c70097485a1c7238313e38133675ee194459a07cef01ad5d1ef013a15ea48277453be1e5c6f1382490bf9c6bd17977cc94eada207b82e2d463530dc670eb84a6462eda378ded678bfa081f47858dddc20b1cae1296ab108cd86b283980287eaf1ac399a8d36a5dd25200bbeb2537c412e6afad50a50ee31ac4451dd39767837dc5465f0c14a3c2eeabe400bb7ae77390e0fdb8ce8c3c12c", 0xb3}], 0x3}}, {{&(0x7f00000063c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000007a40)=[{&(0x7f0000006440)="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", 0x1000}, {&(0x7f0000007440)="977ee5e15c26e4a389ba5356fcf40144a50062ead02d078ba9eb1442824867d381818bde920a8f39b64e70f93e2b1de5b8b5bc277302523ca6981d5780e6ff046fb6aba3304f9a88403a307d215ee32b98f39465e588761be15e01e1d1efb4a8a0c93e61e92ca0cf37d22b7676c818b5c3f1f64507f2eade036d7e3d175c4e094a997937effaae83f6d3bb69d6ef0a503ef5f0bfdd44d214d0b18d04c100e93fd4766ed15a767ac634a652c23bc9b81ed7da38ca35c5a7eb240bc5ae607f9f869710a80ace3913e60c22b08d0ad8feca3405c01b50891ad95a0aa80c38d1be90322710322385b1aad65d898484cdb693", 0xf0}, {&(0x7f0000007540)="d2665ed2e665bc66833ea03c4b8147e7dc6255deb44877369021aa26a657f548b4611b7f257edd1efd9492fdb1ca05e59794f365cde1fb0179039dce6c509ec0694e8b36c59256baf7a69bb8afaaee6ed60a99ca4a8b74a867992bf542288575422840af83404439fbb2e33eda9a2de80afefae16f8a1b38319fad0d8e8b7d6cfd13a0ae76b87655afd3a37727a9baee809993dbc623a56f861ab8510350b755e3b9306ba6346665a1e191f5e15a4a97524a89c31e2a28", 0xb7}, {&(0x7f0000007600)="9b8c7663bfad3da11d9f1e059cba9da5153bfa6c7c5257b1d3e270b720457c2260002e07d3c87a65855613e1f1932fae03bacd72eebf16a37a87faf58783cc94c377250907a9eebd1b596cceb1517d9fe092c770ac591bea5592b6e14152c041c75f716005c39d4f76b488e094420655e88c1f3105e96a0f05263b279e3b3f421d2ab2c7bf68c058a9f31a7277689f936ae4eca8406c2e1d4e31ae8adfed7c0212b934fc70ee9ae5466dbc5eb64e7730321c8cc10d67d2690de3393e939b36efb427e4dafc17b93805858a5a9e5ebb7906818e0f", 0xd4}, {&(0x7f0000007700)="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", 0xfe}, {&(0x7f0000007800)="9ed266865b1761594872d12cd080aa893e696cbb8020162e939f331e4c3cecfc4d355cf607a7951a615be5472f3e82c5e3d7f8f01960966a3f9f57bbbef9ae76bc302fc1b55ca9155417cfaaac9e343718b9a54d45e0e7d4dde674b9dae35bed2662d58a4cbc78152b73bb011d64c5e8e0b93cb34c3e3bfa149bae445ab6f7251e95b88041da60df58f5660b49b67a220456e72bccbe1aa383526be6f4012862c302f8d808231213400f54ca", 0xac}, {&(0x7f00000078c0)="162d753eb33ec1d050992025afe409c4b37b23d308c99d3f378726b76382c6afa69f75227bc9799ccdff116f96857bfd281fa617d8beb1a4f27cb1bd403f819bc7a54cdb4a779b9c58af750a786b74d1ce13235a00529cd44df39f2db15180eb559fb845deeefbaacc3d341b1198fe9df9bbecf34ba9", 0x76}, {&(0x7f0000007940)="e8c89ca30ce62133690a9313457fd7c837ee1cf3af01a78fa91c158c8c504f4a92247a53d27831b3", 0x28}, {&(0x7f0000008640)="ce1f70d6af96e327e605aba6d8117d7ecebed9bbd85c0cc4da9a3d6647bea7c115863c2991d3ec2db75ba29818a18b99a197d43e00b8a2719cf4d691b8cac411e38aa822e9238535072ce020bc0fdb47183ffd24d96e823ecea84e4cc413a8e02e3665fd827e8bd7d5d603f8891f795cdb0ea7e08aa493e356930d69bd3ad3c2303cf72dc9eb8b05fd3e7577201403592bfff78913cc35e7154288026a15892bb5662cb023926804de95e4265917d23fe4a35218c4e296e36bfb868f2a1b941acd0000000000000000", 0xc9}], 0x9, &(0x7f0000007b00)=[@mark={{0x14, 0x1, 0x24, 0x853}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x100000000}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x4190}}], 0x90}}, {{&(0x7f0000007bc0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x2, 0x1, 0x1, {0xa, 0x4e23, 0x976b8e8, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xe1}}}, 0x80, &(0x7f0000008080)=[{&(0x7f0000007c40)="78ef90c20b32721ebc1a3db0840d3ae67e24cf8662cde6e681ca1e22670ff867b035e4417e39ffefd5084f788f2a10168739b47d1a9ec9bd1c578aedb8345cf6de677bf0997cb3012e3e7da00f5d3096a24c4ee8fa85c74033bd7701f22fe2a661173975b5298cf926d101c0e33b19b2043c7226e8332deaae7b28f63a8cf4399bebd8425c2ca91949a2f42652d83e3f55a682d0fb521131f3edc2b2a0df0ce6b6a9303e6f5955020bfa44473650a81a35761f9261", 0xb5}, {&(0x7f0000007d00)="d9853294943d7e4ac7e88574631a352e3d16141031207e065e58e31e819d32c8eafe35fdb3b4fbcb5383656acce5f9ba77a868053abde6f62193ab33452a169553c79614436484018c247c320969b6c4f70d51a3ac23db9b874702b41c0b850ff3090edcdd355fbad2d3c488cc40bce2914e07523e78a8f705a9f0d134cae2fc13fdf117143336f638baa3be112ee34995e48e790aace35e9e6e1197052608045179d1a11a6330a8c756479573c8a43717e3535a29d8358d4d3929b7f484e766b4ff2e0e84bed556194bfa1ae8feba6914404e1523f1e896d2b48c64dcfdc47d57", 0xe1}, {&(0x7f0000007e00)="98efcc14d10e7046e2deddba53dd1048e7a80ced0772b90b8587985326e469c68505f9f766f98ac87290e5d7df5c03bd6b691381435107ffd13e28dc0ec8baa8f4ba7efe6a999ab6eed8304032a73809c0e4f082f63b0c92f30fd5507b6b74d2b953c9fb52b0fc829c03f28787d7070a480ab6555a8a4ae32977d67b3fe719c23daabd800382f5971d47b64bbcc9055e55e2d93c80c7", 0x96}, {&(0x7f0000007ec0)="0c1b984b85192eb3b99c148392d8432a1979b7167683145c942393cd1ee8c2fd398899ecc38639e931615c4d2e301cca7845c41e8e2956af544aaecd97dda9635aae25023506bb6a2240e6c2317ba7f0f374bc6f0377bd3894d55d90cdc815b8b2bcd7c09f2e074980e8c6fe4da426e08ffff2bcd5ea6af3c8856f601ff66bcca91f1177cadf0278c94e6e0541e76e351280bf2528a44c019fb8fd33d81f73fb9f7b935207533d4a60a3af6d1c94632c7b58727f03ef0d80", 0xb8}, {&(0x7f0000007f80)="a4ec6a9509ff09242df55ad9e8cccaa62b26797bec4911e14bbfb2ab22626efe7271425e320ee5cc0cba6c9b48c6557e3ee0feaefd5fa5149253f84be2bbb01bd8e7a07635500fa149f1c7b81250ad2cc0e5324914b1c79241b48a54eb9aafbda82ec61d6e40afcc7fad8ac779e096afb84950f22cb3fe80a73e67325cc5cce9a350e24d284f8738ce2c6a078b0f0e1c82921fa9ea1f3c3f74098844341319458fb303af72d3ef87ba601b8bf16f8b0d17348bd9439cfb51bc4f1838b32dde87350fe5aa4de993506b8e7704cd23714dc6a8b5", 0xd3}], 0x5, &(0x7f0000008100)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x81}}, @mark={{0x14, 0x1, 0x24, 0xffffffffffffffc1}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}], 0x60}}, {{0x0, 0x0, &(0x7f00000081c0)=[{&(0x7f0000008180)="8fd4a01d762f32f7", 0x8}], 0x1, &(0x7f0000008200)=[@timestamping={{0x14, 0x1, 0x25, 0xffff}}, @mark={{0x14, 0x1, 0x24, 0x73}}, @txtime={{0x18, 0x1, 0x3d, 0x40}}], 0x48}}, {{0x0, 0x0, &(0x7f0000008340)=[{&(0x7f0000008280)="f5b9d218e532ff02849c38c5b48538b01b59d5f8fd39b4ef18e5c4291078d7055b4799cf45dfd0ed263bb4dc4cfcec0661ba1bb5729e8e4f6591414982fa879d03d3a468cc782559e90242feb58643a8b596016ea5b1632160c837a487b7d2d12f36f139032d7969032f3d67c000a4dd1a45d06b98e80094df9b4402d38ac0ea654c", 0x82}], 0x1, &(0x7f0000008380)}}], 0xa, 0x40) 08:29:14 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)=0xe5b) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1c8, r1, 0x200, 0x70bd26, 0x100000000, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xb1e5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MEDIA={0xf4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9139}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffc0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe70e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x80}, 0x4000080) 08:29:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80800) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x1, @remote, 'bcsf0\x00'}}) r2 = socket(0x11, 0x2, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x4e) sendmsg$sock(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@mark={{0x14}}], 0x18}, 0x0) 08:29:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11f1a5238800004e7be070") r1 = socket$rxrpc(0x21, 0x2, 0x2) r2 = socket$rxrpc(0x21, 0x2, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r3, 0x6, 0x1c, &(0x7f0000000140)=""/87, &(0x7f00000001c0)=0x57) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x24) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0x8) bind$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0x2, 0x0, 0x0, @local}}, 0x58) 08:29:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdc6, 0x20000802, &(0x7f0000000100)={0x2, 0x100004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dc86055e0bceec7be070") setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'ip6tnl0\x00', {0x2, 0x4e20, @broadcast}}) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x0, 0x1, 0x8000}}, 0x30) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f00000000c0)={0x7, 0x4, 0x6, 0x5, 0xe8, 0x7, 0x100000000000}, 0xc) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 08:29:14 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000140)="2409846978944253a7a53e0cd8955506", 0x10) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x10001) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x94001}, 0xc) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x80000, 0x0) r2 = gettid() recvmmsg(r0, &(0x7f0000008cc0)=[{{0x0, 0x0, 0x0}, 0x7fffffff}], 0x1, 0xfffffffffffffffe, 0x0) ptrace$setopts(0x4206, r2, 0x3d, 0x1) tkill(r2, 0x1000000003c) getsockopt$inet6_opts(r1, 0x29, 0x37, 0x0, &(0x7f00000000c0)=0xffffffad) 08:29:14 executing program 5: set_mempolicy(0xc000, &(0x7f0000000040)=0x5, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xea, 0x73, 0x0, 0x7ffffe, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8082, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) 08:29:14 executing program 0: r0 = getuid() mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x40890, &(0x7f00000000c0)={'trans=unix,', {[{@aname={'aname', 0x3d, '{cgroup'}}, {@version_u='version=9p2000.u'}, {@noextend='noextend'}, {@version_L='version=9p2000.L'}, {@msize={'msize', 0x3d, 0x9}}], [{@subj_user={'subj_user'}}, {@fowner_lt={'fowner<', r0}}]}}) clock_gettime(0xfffffffffffffff8, &(0x7f0000002940)) 08:29:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0xfffffffffffffffb) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x5, 0x3, 0xff, 0x1, 0xbed4, 0x7}, &(0x7f0000000100)=0x20) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000000140)=0xdc) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000180)={0x1f, 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x16}) 08:29:14 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x26}, 0x3}, {0xa, 0x4e23, 0x3, @ipv4={[], [], @remote}, 0x9}, 0x5, [0x13de00000000, 0xc1, 0x5, 0x3, 0x0, 0xffffffffffffffff, 0x7ff]}, 0x5c) 08:29:14 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@multicast1, @dev, 0x0}, &(0x7f0000000180)=0xc) sendto$packet(r0, &(0x7f0000000100)="b75dbbba7f8ffdde2f94e723aeba7b2ead890b17763175ce52e6ed", 0x1b, 0x4000, &(0x7f00000001c0)={0x11, 0x17, r1, 0x1, 0x3ff, 0x6, @local}, 0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x2, 0x100000000, 0xfffffffffffffa98}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write$P9_RLINK(r0, &(0x7f0000001300)={0x7}, 0x7) 08:29:14 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:14 executing program 3: seccomp(0x2001, 0x0, 0x0) 08:29:14 executing program 0: clock_gettime(0xfffffffffffffff8, &(0x7f0000000040)) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x723a, 0x440001) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) 08:29:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendmmsg(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast2}, 0x2, 0x1, 0x4, 0x4}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="79dd6d3d2bf2af3ccd4ec23865f2ce2ccc03fb040fc17adf8b99c477e2ba5da78e98d2342b20d0669576e064bc54e3eacf7bbf68096b127979b10a99fe29b70da11d6dc414a5914ae207db2250aa0d8ad9c1470e6d38a18e7623ae786072aef20da06bb56af3fecc03793670fbce6a3f2de014a90a80e0352ac074d581eaedb4812597db061a", 0x86}, {&(0x7f00000001c0)="6b2e9e686680dbe7c5367a4907ec1a99add6102a6d14ea547775d8ac2399da9e45963dd6f111a15ac311028710dc6e4b7ded48855980cb7324d98198596d5cd9d3b973e0ef07b812a62a293e7e59991d4b0b020cb3689ef4bb45f929e39bdade10066186958f92c44070bddae6c0351d2a8a283de1681d2e3d76a8e99065a9095e5731aaac38da73752a575a90551b", 0x8f}, {&(0x7f0000000280)="9d80ea7c872ee1998f116d8fb542463be35bcf1757276782c5b2204feed544acb46fb998d84064cd12bfd3d1df8feeed76168c706e9a9e9253a2edb4cb0cc704bc6d39b5b01adc49312033378c3b7cd0146b5cc97a48f30a54ddc5", 0x5b}, {&(0x7f0000000300)="bd2a3f0f4ce32e333c6e60bc4e9a8a20ba160f3404cdd37de956e804a7fe5b626957694127f140729689c80424749c170e2ad7b7efa5c346e6e2d0afcbb141d85d158c98fd5d6156f8", 0x49}, {&(0x7f0000000380)="871ce4d711e18791b9f56f99c28de3086edb64742e66967623de909faacc5a68ca483bd2a9100a9e3ffc2d8bc67911db40c53ef42ac2ba61da132d2751e2b9624a04c18ab25be4fd3dd9aead126699ad1115675e2f", 0x55}, {&(0x7f0000000400)="40b3f1105cf9056c928ad356767e51472f49ef7966089ee1fe00e590b74488bd6d493e80aae7d4b0490e74d04b144488dc9892523c3dac", 0x37}, {&(0x7f0000000440)="df977ee428d82613ea4b08dbbe455129811aceff6aae3b6581b416e058f29a12c326fff4b3cfc90458131b283674ae2c6a362a22e794f237b3aaf2a478cccfc8133b2b531538ec126ff1ebad6a8e95f1e1633e8ba8144fb2cb", 0x59}], 0x7, &(0x7f0000000540)=[{0x78, 0x115, 0x1, "e2b264b19b4cc4ae98b4bb0ece105a033c8b426aa2f4b236bd46a44ce663727e6d7794309d94fd28d66bd0a2cdcffcf6ffc656d524156254e4e2e9a9ba3a78b32a50a4009f2634741b63838a6798ac727c6ef139546ac93fb84f3e78fbe13e7e094dd38793ff"}, {0x10}, {0xa0, 0x13f, 0x2b7c, "04b0ce3dabbf6032827dd9dff59619ca1d4d000e7ef067c1ba707e2b9e5b745126f0f9c7d0c9e5263d1b42633eefaf8ed4100186607560354f9a6d713c756c7f542ac394634da5f1c68250540962e34f82e6202cbf96e0db56c49d01afe3de92a02dcb77177705644b9dae580228a269a2a95aad0d843e50584261fea867faf8e1c9ffcca74cebc5293832"}, {0x1010, 0x107, 0xf4, "057912986ee272e64ede5d3e326fc8b0cb5e434dc1dd01bb5b1b673f51eb61eb19a23bfc8438d4270c0ef7ee37725cdf9e2939d6f1fbf01381722a1e77703786d04ef2e5b6f3c19817009609d4d266dc6baaf1e6238f6020ff8c9a33eda20f606a9c6dcf80e21da1ad1905dfd098706495ed02cc02fd512f6c17cb01dd590424d03b7348bbce09b8517aa5317a275f61aaca0cbe3108defa3f718fff9fa7d9376393385283a0933fffe7cf870211e3597bcdc8d96ec3e8bbc6b3af9e1a3cfb6cec87efc667e00c4deaa0bdcb25a1d6a66a912465386d4dc327676e39bf1db45423bcfda57d45d7e6517a90b593a6b5e94284a281c47ccca8d1a834474bb4e387a5de603cfc59ed5c43a9bbec6cf446cfa57a273e03a40c95cde2d194f1dd626c28972d0c61fc0854d094077aae43d60f56a8372ddde7765fd0205da9b9392c01d69fcfecc1b1c0779fcbd80cd0db22d3d394fc8a9a710290a87104d295163d08d01ee1ae2cc7dc4783710a08ab82d3acf468c5443a5085ea70aa1004a5266d947af742e6aeeba70c69e4caf5528159a34b04b08eab3e587050fdec219f6b61b4cb7309c50e7080d9dc7ef0984c722e6d3656aea740bdb83621ff27c84d9a4c68910093f3828c256147cb647ddbc5fb5b9e6f05c9a55d77251808edbdd9a3923e682501a291d7c9c1144d58680090e6997b60d83f08bb358774268a913cf31c161f911f0ff201f1392826d3f7dcae0189796b60b09005bbd1abc58fdc182b8b27abfb3ec440b287eb276e109c0b095468d17435dc646325aabe733e6127bcc7145faeea992b854e7158b2e95d76618518c700d802da28419a6987dfb937774a284ce52d6b6d0c57506e06b037425dc70867146ba28c2e833762ebb15cf30c6dec4e3065497d0e7891f86798477602060cbeb4ce34e19eff287e9302416689082af23eea66816dd76f71e607c1f40547cd5ebd592c556f91806677b1dd3b5cd39909a4252f895d5f654f27def761bdfee15594cc95f1d4bb917812cd41d6e0eacb9612b7c097af15c89fbe3968e539043c0875e433ab6fd20833a34df70fdac7492db4b25be09bfb346e43ae8ca31f4d98e3e76b8dd3dabcb8ecd7c4ed34d71bee106932c8919d53a6716991b47eefd1f6b8cf6077328d75af5396a7cfbabf5e7724cf19b2223b4977254e28d107dda50998012faf15f82e201a8cf9341159e92af6273cd45bc884854325744bae7d47efa2742430107aa225333f9aa214a5caf09f9520cc9f958353cc6966609fca1bc394865d4230f46e48b256115280a304ddab8da08fe5a2169ef357a0d31d895cdbbfefc984d884fe80e175b99cd7310e18eb3f6c86f431b614f2707f5d5f0e08c802cee8607f0f47cf10602b841ece5279d9987a7b8098e0257643081fc3308436d046a063fff01f65c58ce0d8d447edd0b0123af2a42c49ae86233c996a3d47fea0db5bf31898d11d34960cfb27ef88df9877dbed19f83b04845155a0b32f32ba5e1532d82508c26cae5f276a58102d3a1bb972f24ffb4e8afcabfea860a159dad8fc0e226e57c2bd9dafe065c523f3c49ab81122b007315647ed84d5e313e2629657d7cdd91799304ad3018d7639a4f2ebe13964e39765c99343dca6ab680d9c64d471852fc54041c60acb8d1c66de7a717f2088c87f65c6fa9cb487b306bbcbdd84907bb8273d8026d210d84b68b1a9c1ec5a36912fd56d8692adfcfa9e39762d57e2f8b477691800a3cd7369ccfb57f86718666ef7a14037a8a7a28725da112da7cc5c1a80c05fb879856ea9cc5b7674baad22d1d660914ccc4dd5de1c144c8d093e8f6135adaf26380077f53dd651a2c60ae55077fe2144128e6db926d0de73640cccc2d58ab41651922c809dfbc8cc15d6c9873ad0622ae8c70da45d4d36afffed1e612204812e49a20d8228eb868e8b57efbd6a8b31014b3c838512bbd6ab0645e4fc6dc01e2e0bdbb8adfe02f3ccc820696a2dbe0b9adb887f7c482f5dc24c596bf15847b85f3a1396660ae0326b7e8793c0793c6590efdcd36bc170777ca02f3680f69f7f53f4d0c6e09c31b2f31a59ec443dac81a59a1dbe559258541de51d6ab0335508ad2034c1a1c58fd90b4d23818d37cb358266046c3d84908fde55aa485add40539749fa28468b03869fce37b2ff301eb4b6594da2f806a71a663d3f85a6cf57410706692506ec34ff8cf99033c1174a9f20a5956085fe05d9208b268af498470e817097ac3c0c9faa76ede08d65a3fa00f71e71565d05d4cc0f6c78d5b9a7a095ee0bc09b54922efd48eaf2914babd18ba46ae30d4ac9268b62e97e70878f87c0c80d4764720df2544d86f45edd3871446f83ab8fe8dfb86009fea045712d996d6ac246e190aa824a17353ea86640e343645de27438bfe4b92f7aa0f6ea8336da157055a1f75e860b2f8dc2df3eb24de76dd8cab4dac3ffc70acae73304de6ef755a62794f7fa8443365749000216fde84c89c7e029af61f3ae7cd25346ce7992404df420d31cff010ffede72c7c0a43bef4cd0ae2f0257e00b2f4aefd93cb04586c631980aa9af6907c074d1b57b3cddd4b40264c4406361566ef245ab2a304a43ed19ff2c8056fd4038f1948196d97fb729131ed2171dcd51424afa0d2502b37a7d8d1a22b87c4887bc8e4aac1938ec623ce09eb768dfbb07877a53c7f85bf7c3a5e2d94a211ac9516dcecfe885b1ccd3567a008a43eb65b95a53b63467ec889601af2c2de4a88476dfc82880428fc45532cfeb3fdee0324a0453a0cb6bc1118d076b659c2346724487695e6076b4382552f4dab4b33532117572bf4dfed07bf2499178b2ddb6cb902a345260c2e909d3dd26a4dd275747908fc23b5949cf5d2360202dea0ae1cd71351093cc833309821c205fe243947ca23e355e696740f730c012b04a60b54afb641b8e2d86be55e0a485872b63fecd4e242b24050a84e9fe0875a32953196eaf7af07f7d7760b2b1475a5684bd103453ea804c72c2ea71c8b25259aad59dbc9b88f4492b2cd9b80cc81f8521c9d3e286c7413519045b3ff2cb61e78bec676bb497bb3b6b11977b9d590568d850fa3b5478f7c3683094333d6a02b70c2aed615399e8b8592e68e4a608570c3201b0b8f1efb581cf20d77ecf16ce237d6ddc291c3c969e4c9cf6667c7114b52ec3afa95cc3f7f1eee8367c456db666e7a70783b805d34ff7be433fff9ed87a576b3dc0c93170a57ff92f54cb1abfb74e60716f7ccf38297b3c8d33bb05d458eccec31047122bfb16035d487ad7be18be684fc409651e7310b74eaed0fa75ed744927bf15e2971f6c9c7e13fc07397c81b0a6342498242e3a02f2d173c5e89f528b46c7eb82cd374ef609a000a5672e7283be2033315d480c16fddabd9860815c02b6a8ece578ce85db72607f3e602a2fd033daa3fa98f6b056e22ff3f42f2527ef4ebedaa7dd66669b5cda69b65932e92e4e3b73460d795942b04b5d5089d4ce2af73fa49d93f6de5ce2e261342379c5ae4938748039629b080c3abab0b5858b5c29e3b1968f5e97a794b90b5f4a5fd7498d00162b92e0769fb50ad3c06d40aad30cc0de0cbc08b6e447d941aecb055e00f0b4a09159f0e70fbd85869a05fe962f92bc73cf6f03943d4e1b3a266b717b33410897b1708c72cb3b839b6eb173cbf49a60397c256b71e13241f7627227ca2b14b7ea4935f7e256a551f123ac16a3d9f737c4e7d47e780960153193f2d2aa3458b8fdfc169aba81008cbd21044a7206ff615e6890c7b04d0e2d9ad049abe1114db10d0774a5554431520504c58c8d2d9e81ffcf1f9e003540e13869985978415dfe38ca265adec64e0d21c30cddeffa62a226f4927f3b43b378feafaa34a96be692c899e7be23b815efaa81ba44439891d0ffb6b55267f647ff051b974072f3c8dd7b6cd2fb702e22311311c723afd284e1790eeefb100bd3f274d5777a6a98355f59c7c516361fc9ede298bbfd060fb8e1a356132910bf8d8d9b54bd826c7259aff80a6ebba08aa4ca8c4edb99352adc9dcb8fa25e75a94881f151d5991ad27753660dcb1d2ab42032dfd0dcca9308ebdee85aefb4f112aa706bb0dbfb7615497306fc104fba053d1b1b06ebdfa16d44a0ca29f72d9d18ca7b637b39c3b2c1ca09c67cdba17efffbde280fbebef409d06294a427e141d3572e593e81473c3462c31a24fd59a1f306b3a72108ebe4be08498106017550e8664eb389f17f60ae1a96d3843d9f95391e71115e3106365f14d27840676d9a9518942d0babe915767334ca97ad65a949263bf43540be2fc1b1a28558d33896cc098be76c43b151fe0df8288688483dc0573043feaa45a462d7d9fdedbda37219022a22051280ac50482c61dcb8ae311df9483d50da49df95550a45886805633444af2ad7aeb3e3c22bf2c85e6f19fe2ab31b425f92806d2792566023158201718e61e0aad53bca83bc8b70424bd6c4af97310a70af712a08d2bc437600a58d0821774186786712e276dc513ab669f8d99c65e915ef04b74d220485ebe84c82b140f3409b3788e909c1bbacc99c0937e724485206552521346b26aaeea27563010837479af4b21f3d77064597a0bcf65174236fb8d36385601078fe644bedeca366b8415b091217831121daece6bcb1cbe71e99f2983917b3f87203e936ae9be92a5fa48d8eb8ff8dbfea6dacb2b1fee4da2b4ff44933abb4a034ecba05c48cf13955e0ee3254b18bf49f72e4abe15b8708adabdc4956193d2047e3162f1fa5791dff63d4914d3ca773d1761883d934856558c1f1fa5d8568a4a401b75a8024d11c28f1b9d9fd18a287eb1d253a4ba1ca5f70fa9ca8dc4b826460e1846b5b96523c3386c8f31ce483b8cbc7b231a03031d3adc61c20ae91ef7f426bf3992b12415a8db6bfaf09d62fa1891151081200a2e320c31d65cb91d4e8a9159c7e8d1ce25790f92d01cb3b6aa77123bb3d5c7aa01c233e3279952063de412f3cc43ed5c1ccd89fa87b86255069d7f5d905c9ece8828ec8ff19fe1be8e6a5c602ce289008fa415d1a3ad46e797712970043d7a1a19dd180ad78737708d640f06f21039965328db54073aae2c54b73b8295a9bfdaa624bb311f469b4c65e6ce0da514677741c35b957c55fcd8d71ebdf907cd869ccb41234a493c10eee4af82949501aa53d114dc505a34c5b9360cd2a89ff97407b0260269bff7e5ff07b84d9dbc8ac64a4f581750d1d542c93afc63c9a339c79909a7a836111d2b1398dfd5330b794d574e1fd8574d00370bde147a0da0c9755c55d9cec493f1c30698501ac26d30a838f04c4cb9858304e4e6058ec6073423cb4146201a99f2bd40d27ebe72361ca659c185daab69a8c78963f2f7be6a6bd177127b6ed8eac32d44754efc2dd26887a2cdbc32a00880307dda3936f620c060fb5514c47b2405b09d9a022003976a7d8a9d9e46b745f97b1ee0f1cd7912b17540d89a24589a4f90bf23e49d80317473e6363a4a6bd240cecc5e83859c69602125f92b5285191dd13c5ff75d4153e17c1932b599fc35d934fced8b7a4dcfa4eff806960410f384e01fcc74c88304d8c887ad0e34e59f0b10a5390ee6984bc24346d51a15dbf6336914dda92dd6bbad915968ffd4f15ae4e7a250a0416d709ec1a3acda2ef80d2556b1561e3fffa5b316972ee4e56c64658bfb755a226e77175d5e3fffe607374a3b3b3ae42dc57bc099479e79a2af4c583af8cd8ef9d19c491fc3849df7aca642b7bf7d8ab231511b8fe72ffde759d98836175d065"}, {0xe8, 0x100, 0x6a2d, "ef86b92fedef28e867454a79497d7bc6b04bc4dd3e96f047f4cd1717e50a80fa8f303f589ccf01d921e6284ac110c94974c93322decd032fc1f22ca4c0bb40f5d36bae3b27ef270b0ca0efd06326ff578ad8967618ecdfb95f65ac061737d49c260ec926c5df94b3320e1ea0b4b91b134c6f8076e2cb4b37ebc584f443c2a47868c070c8bbcb349851a20af9231e31c30338b9235a4423a5caa8c4a1e2d6bd3cc41e344d66f2af2a2b8792a792cd2ee8cbe28c6dfe929cad6cd214ea5645a5483b3c2e7def94d619cb64740b7dc7a1376279eadd0ff33599"}, {0xf0, 0x13f, 0x8, "36cf534aced5e85d3f798630ac667e5c0eeb27b5bac9ece7777d8b14d674b62f22183739c01a683948721aa3302cdcfcc946f419745189ed9b33e83f09fb8d605177ceb17282163abfac25fe59e77200d7d3b7f7f4e4119e648c11496648300a841c2d2cc3c31d9866da10472dfedc5c58e8a110bf2fd9f7acd9d0ecbfc4899243d12065aee9c3ab42e65b52dd34a23dd453a745adc40d519648848d290aae9a8f6c41194fae6960a119375fbedd932b06cb5c8a0031f7c3780ccf617106b7d1234788fe76258b157cc21048b4f22f938bc9a1e0e0ce2ab0186abdba8b"}, {0xe8, 0x0, 0x20, "29a6b33a13c8446b6cc2346fb459ee11f5575697e809cc292c4280aa8a429dc841a0042841c9d4d27f254f259f39eb4a413e74e16116d96caa65b16d0d798141899e64fd8aac57b52e828babdd73cd167b25cad6acc5a5c497f33bba9c24de62dc394dacd00533d63fcc4233ddee7aefe5e3c136b7575971de4c71507a565ae103a558017091a67da965acf8469cb3a45296c8006f166522a7d2311f8c85e025bc8a1766dd07b956aa5ab62ae5a979f3eb9b822a53b75588651f15b70ff739d685b826519159cba1c7332cfd594581d40edc412686c9e934"}, {0x10, 0x101, 0xebe}], 0x1408}}, {{&(0x7f0000001980)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x7}, [@bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80, &(0x7f0000002e40)=[{&(0x7f0000001a00)="308e4d8805c206dc0244642f7f80b7b949f1617e6fab19e67565e652a0785c26cb18b19aba8ed375edce255767c606bbfc8f06f7d86bf45c6527b81c548805ced7ae3d067d0f83ab8195bbf71355b5bd70078df8d4a477bc293900534d14d547015934be0c46f4982f922f03325961688ffc8efc46d6e26aa692161009c54bb9696b146d9d36b3685d06022b19663dd15f8fb92f7526c1c895e0", 0x9a}, {&(0x7f0000001ac0)="aed5fb166c39f82c4c132e699beca67115737c", 0x13}, {&(0x7f0000001b00)="21616a670bce790b29acfce3399f109adb11c6b72d5c1d16099c20959e6396028d9ac16450bef460f0c076dde8af1f236e246326421cbce6edb1645069a92adbe480cabea8ed9e8f0da897be8e7f3af666247fa5f89159722b1f0946b1e2b41c7793b45c9648445db3dee8e059d380501f5b02d720b2d2f0e784983cd5339a7923a07160f6bd75cc9c7df2dc837e0dd7bbe907ff8025060899eb7e381d399469c821948cd2ccee70c3460c2ede632342a0c1180fe47f5da9b4ac3b25cb9e57f01dc7d86f20dab03db9", 0xc9}, {&(0x7f0000001c00)="a3099425cfc51aa96290f5b8b64af4108df8dd4c768476a35ecd0f730fa59ba8c66f", 0x22}, {&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)}, {&(0x7f0000002c80)="df60ee400d413deb48ab447fe2cf37e555442ef2213c98642cfd1e732ed0e8fde88788d26532610405da4042a580c498e04eb9fc8544bfef7e1c217f7ea776c0122fd55daad409f12d3fb1a810ead4a3144465645b5122a387f83fe6cda2a3141a494ff5a0abb984971e7eaa32eca1b59d58bef733ee3325d151f50247e0e9f1f5d7b869c982c3b5e3082cf56c0e74accb2c6120af781a3de888eccd2624700d12da135829b50d372d153ca5e7289f53867080c6bbae85a3daa72ad0", 0xbc}, {&(0x7f0000002d40)="2a4e21418f7cd2c5ddf92497aeea14e5b44ab937acc8bee83379fb2d8e388a139d2a85a2010ba090ecc235b8f39a2ec207219aff5589edde7a12f238217f3e09140fa19a347d9d54591d39fc06cdc8264d0abe7c8cb7989469c9589be93e7ddd05cef68f3467be5d7db6b05da4134f0471c7798985dcf086242003c83da7fe783b798909d15e722f991d67677ce441ada00b1ae9836d2c5a01115391b39f8872581f5bea66a9783652cfe31eaebe2e75cef4df80aa6c12a45d4fb87c7673ec13c42ec3d48a0005f31b34", 0xca}], 0x8}}], 0x2, 0x8000) r1 = socket$inet6(0xa, 0x6, 0x53) recvmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}, 0xffffffffffffffff}], 0x1, 0x40010023, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) shutdown(r1, 0x0) 08:29:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, 0x0) connect$netlink(r1, &(0x7f0000000040)=@proc, 0xc) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x6, 0x2, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000280)) r2 = gettid() perf_event_open(0x0, r2, 0xffffffff7ffffff4, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x345) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'syzkaller0\x00', 0x5}) r3 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffffe, 0x81849, 0x1, 0x0, 0x4, 0xfffffffffffff532, 0x5fd, 0x100000000, 0x6, 0xe96, 0xfa24, 0x3f, 0xffffffff, 0x45, 0x0, 0x18000000, 0x1, 0x8001, 0x5, 0xc2, 0x0, 0x6, 0x100000001, 0x380000000000000, 0xfffffffffffffb08, 0x0, 0x9, 0x9, 0x2, 0x0, 0x0, 0x0, 0x100000001, 0x3, @perf_config_ext={0x7, 0x2}, 0x80, 0x3, 0x0, 0x8, 0x9, 0x2, 0x9}, r2, 0xf, r1, 0x1) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYRES16], 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000100)={0x0, &(0x7f0000000200)}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000549000/0x4000)=nil, 0x4000, 0x1000002, 0x1010, r5, 0x0) ioctl$TCGETS(r7, 0x80045438, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 08:29:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) prctl$PR_GET_TSC(0x19, &(0x7f0000000200)) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000180)=0x78) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x800000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="ae"], 0x1) fallocate(r3, 0x3, 0x0, 0x800001) sendfile(r0, r1, 0x0, 0x102000002) 08:29:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) flock(r0, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x5, 0x0, 0x0, {{}, 0x0, 0xf, 0x0, {0x14}}}, 0x30}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x1c, &(0x7f0000000040)=""/40, &(0x7f0000000080)=0x28) ioctl$KDSETMODE(r2, 0x4b3a, 0x100000000) 08:29:14 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000100)={0x2}, 0x1) clock_gettime(0x200001, &(0x7f0000000040)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80002, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000080)={0x1, {}, 0x6}) 08:29:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, 0x0) connect$netlink(r1, &(0x7f0000000040)=@proc, 0xc) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x6, 0x2, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000280)) r2 = gettid() perf_event_open(0x0, r2, 0xffffffff7ffffff4, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x345) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'syzkaller0\x00', 0x5}) r3 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffffe, 0x81849, 0x1, 0x0, 0x4, 0xfffffffffffff532, 0x5fd, 0x100000000, 0x6, 0xe96, 0xfa24, 0x3f, 0xffffffff, 0x45, 0x0, 0x18000000, 0x1, 0x8001, 0x5, 0xc2, 0x0, 0x6, 0x100000001, 0x380000000000000, 0xfffffffffffffb08, 0x0, 0x9, 0x9, 0x2, 0x0, 0x0, 0x0, 0x100000001, 0x3, @perf_config_ext={0x7, 0x2}, 0x80, 0x3, 0x0, 0x8, 0x9, 0x2, 0x9}, r2, 0xf, r1, 0x1) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYRES16], 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000100)={0x0, &(0x7f0000000200)}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000549000/0x4000)=nil, 0x4000, 0x1000002, 0x1010, r5, 0x0) ioctl$TCGETS(r7, 0x80045438, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 08:29:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, 0x0) connect$netlink(r1, &(0x7f0000000040)=@proc, 0xc) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x6, 0x2, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000280)) r2 = gettid() perf_event_open(0x0, r2, 0xffffffff7ffffff4, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x345) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'syzkaller0\x00', 0x5}) r3 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffffe, 0x81849, 0x1, 0x0, 0x4, 0xfffffffffffff532, 0x5fd, 0x100000000, 0x6, 0xe96, 0xfa24, 0x3f, 0xffffffff, 0x45, 0x0, 0x18000000, 0x1, 0x8001, 0x5, 0xc2, 0x0, 0x6, 0x100000001, 0x380000000000000, 0xfffffffffffffb08, 0x0, 0x9, 0x9, 0x2, 0x0, 0x0, 0x0, 0x100000001, 0x3, @perf_config_ext={0x7, 0x2}, 0x80, 0x3, 0x0, 0x8, 0x9, 0x2, 0x9}, r2, 0xf, r1, 0x1) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYRES16], 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000100)={0x0, &(0x7f0000000200)}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000549000/0x4000)=nil, 0x4000, 0x1000002, 0x1010, r5, 0x0) ioctl$TCGETS(r7, 0x80045438, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 08:29:15 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:15 executing program 0: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x80000000000000bd) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRES64=r3], 0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x1, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) close(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 08:29:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) sendto$rose(r2, &(0x7f0000000040)="860fe2b326a7ac4707bba5b78d04907401948f4e2135dd3753ce3244eb9a5c0aed48c4a57ee3de5d8a54359fc04691a56e77336666", 0x35, 0x4, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) 08:29:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:15 executing program 1: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x4) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 08:29:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(0xffffffffffffffff, 0x80045530, 0x0) connect$netlink(r1, &(0x7f0000000040)=@proc, 0xc) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f00000000c0)={0x6, 0x2, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000280)) r2 = gettid() perf_event_open(0x0, r2, 0xffffffff7ffffff4, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4004700c, 0x345) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000240)={'syzkaller0\x00', 0x5}) r3 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r3, 0x20000003) r4 = socket$inet6(0xa, 0x6, 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x5, 0x1, 0x8, 0x4, 0x0, 0xfffffffffffffffe, 0x81849, 0x1, 0x0, 0x4, 0xfffffffffffff532, 0x5fd, 0x100000000, 0x6, 0xe96, 0xfa24, 0x3f, 0xffffffff, 0x45, 0x0, 0x18000000, 0x1, 0x8001, 0x5, 0xc2, 0x0, 0x6, 0x100000001, 0x380000000000000, 0xfffffffffffffb08, 0x0, 0x9, 0x9, 0x2, 0x0, 0x0, 0x0, 0x100000001, 0x3, @perf_config_ext={0x7, 0x2}, 0x80, 0x3, 0x0, 0x8, 0x9, 0x2, 0x9}, r2, 0xf, r1, 0x1) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) r6 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYRES16], 0x1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000100)={0x0, &(0x7f0000000200)}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000549000/0x4000)=nil, 0x4000, 0x1000002, 0x1010, r5, 0x0) ioctl$TCGETS(r7, 0x80045438, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 08:29:15 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x2, 0x0, 0x716000) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 08:29:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$can_raw(r0, &(0x7f00000002c0), 0x10) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e21, @broadcast}, {0x307}, 0x28, {0x2, 0x4e24, @multicast1}, 'bridge_slave_1\x00'}) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = dup(0xffffffffffffff9c) ioctl(r0, 0x8, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x1, 0x3, 0x0, 0xffffffffffffff69}, 0xffffffffffffff61) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getpeername$packet(r2, 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x10001, 0x2, 0x5, 0x2, 0x0, 0x1, 0x8000, 0x0, 0xfffffffffffffeff, 0xffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0xc, 0x4) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000003c0)="9275f86548d8a9685f982b6b37e5f39c91c6a9ae1fcdcc0ca6d03a87d468b28827c259431a7c23df55f97712a34a4c4d1375a830587011ef7f3169f0e8feffe8172f783037f72be07f378b5cd147c5a73f92e9dddc934a144e1f4fd37e46d8af3a05cfd02554b49d73e0dcb6dc90a41b21f3a7070234c53788a7fb213e62ab77d02fb6f592b30f210973c7f75864aac39778", 0x92, 0xfffffffffffffffb) keyctl$update(0x2, r3, &(0x7f0000000480)="53434ca1dc7065fbad464d32752374aa445dc0602b2a41c2778186350ced02de4372a981887c1beecd6d8fa4", 0x2c) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="5f6d655d15f3b8e2fd80f8c680f0769100101134c9580aae59e9690b42cf83ac8d43ec240ac775afe2e87f48fe0c96738e6e6e7edc1cffce6d1ad31bd372ec283a70a5bf22c51789d9472a0c0f261c90dc555d2d229701aa58f27cc57cc42b78ab98552b60a99ebc5303d260d1dd088b1a4e0d50a1bff447cce8d7991c3874ada0b7e7f8636ccde2d29b90bd4c25687eaaf6a7"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) sync() ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) sendto$unix(r2, &(0x7f0000000040)="a85a3a5a9485183e15a4e3f9aca8063749b19d969c4e982264112349212461038b7b0218f42b07fe7100cf9b520ca9271b190e6ee8c183fa62eeadf78f33", 0x3e, 0x4040000, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) 08:29:15 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000000)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) setuid(r0) ioprio_set$pid(0x2, 0x0, 0x0) 08:29:15 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r0, 0x2, 0x18}, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000003c0), 0x3a301e0909ff38c, 0xe803000000000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x185200, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) connect$packet(r1, &(0x7f00000000c0)={0x11, 0x0, r2, 0x1, 0x3f, 0x6, @local}, 0x14) 08:29:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:15 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @remote, 'bridge_slave_1\x00'}}, 0xffffffffffffffed) 08:29:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) sendto$rose(r2, &(0x7f0000000040)="860fe2b326a7ac4707bba5b78d04907401948f4e2135dd3753ce3244eb9a5c0aed48c4a57ee3de5d8a54359fc04691a56e77336666", 0x35, 0x4, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) 08:29:15 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x181840, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000180)={0x5, "758d78366fc04403f12e82713fef1d2dcf34e4809c48e4758136479473f5fd06", 0x1, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x725, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) 08:29:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad14, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r2, &(0x7f0000000280)="b156d417452c8f6d46ed475dca2e43b3b1077f2abaa85e3489c66107abcc517e", 0x20) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) sendfile(r2, r2, &(0x7f0000000200), 0xff8) alarm(0x612) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='@/\t^ppp1systemproc\x00') [ 224.407920] input: syz1 as /devices/virtual/input/input6 08:29:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$can_raw(r0, &(0x7f00000002c0), 0x10) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x4e21, @broadcast}, {0x307}, 0x28, {0x2, 0x4e24, @multicast1}, 'bridge_slave_1\x00'}) semctl$GETVAL(0x0, 0x0, 0xc, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = dup(0xffffffffffffff9c) ioctl(r0, 0x8, &(0x7f0000000040)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x1, 0x3, 0x0, 0xffffffffffffff69}, 0xffffffffffffff61) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) getpeername$packet(r2, 0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x10001, 0x2, 0x5, 0x2, 0x0, 0x1, 0x8000, 0x0, 0xfffffffffffffeff, 0xffff}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f00000000c0)=0xc, 0x4) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000003c0)="9275f86548d8a9685f982b6b37e5f39c91c6a9ae1fcdcc0ca6d03a87d468b28827c259431a7c23df55f97712a34a4c4d1375a830587011ef7f3169f0e8feffe8172f783037f72be07f378b5cd147c5a73f92e9dddc934a144e1f4fd37e46d8af3a05cfd02554b49d73e0dcb6dc90a41b21f3a7070234c53788a7fb213e62ab77d02fb6f592b30f210973c7f75864aac39778", 0x92, 0xfffffffffffffffb) keyctl$update(0x2, r3, &(0x7f0000000480)="53434ca1dc7065fbad464d32752374aa445dc0602b2a41c2778186350ced02de4372a981887c1beecd6d8fa4", 0x2c) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="5f6d655d15f3b8e2fd80f8c680f0769100101134c9580aae59e9690b42cf83ac8d43ec240ac775afe2e87f48fe0c96738e6e6e7edc1cffce6d1ad31bd372ec283a70a5bf22c51789d9472a0c0f261c90dc555d2d229701aa58f27cc57cc42b78ab98552b60a99ebc5303d260d1dd088b1a4e0d50a1bff447cce8d7991c3874ada0b7e7f8636ccde2d29b90bd4c25687eaaf6a7"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) sync() ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) sendto$unix(r2, &(0x7f0000000040)="a85a3a5a9485183e15a4e3f9aca8063749b19d969c4e982264112349212461038b7b0218f42b07fe7100cf9b520ca9271b190e6ee8c183fa62eeadf78f33", 0x3e, 0x4040000, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) 08:29:15 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 224.526237] input: syz1 as /devices/virtual/input/input7 08:29:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) sendto$rose(r2, &(0x7f0000000040)="860fe2b326a7ac4707bba5b78d04907401948f4e2135dd3753ce3244eb9a5c0aed48c4a57ee3de5d8a54359fc04691a56e77336666", 0x35, 0x4, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) 08:29:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r2, &(0x7f00000011c0)={0x0, 0xffffffffffffff3f, &(0x7f0000000280)={&(0x7f0000000080)={0x62d57b0955592a30}, 0xfda1}}, 0x8005) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) accept4$tipc(r3, &(0x7f0000000000), &(0x7f00000000c0)=0x10, 0x800) 08:29:15 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @remote, 'bridge_slave_1\x00'}}, 0xffffffffffffffed) 08:29:16 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @remote, 'bridge_slave_1\x00'}}, 0xffffffffffffffed) [ 224.759439] input: syz1 as /devices/virtual/input/input8 08:29:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @remote, 'bridge_slave_1\x00'}}, 0xffffffffffffffed) 08:29:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x2000) setresgid(0x0, 0xee00, 0x0) r1 = getegid() r2 = getuid() syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x1f, 0x7, &(0x7f0000000580)=[{&(0x7f0000000100)="19da6dac5643b669a4ea512f0224bc5dfb18", 0x12, 0xddc}, {&(0x7f0000000140)="93275c4df9a55cffb3ed7e3759c7beec43970abb26a5d5a1bb74911e3bc7d2b08c49fa4dd4bec95134947518772e49d7e587ca6f8c495aa9ae1477568df88d4358fa4377c36ad037eaa0cd714786c4154063e4667099224d7b60dd1ebf5b72f7c0a5483ea3dee5321aa8904f631204ac00842837c01000863ddf867fd3dc352bcceada7cfc6e3bb4bbb151407479b177937cfe9c2eebb1f12bf52fb21a671dbad38d97a2377faac3edd281f3471cf5a97402988390f73b", 0xb7, 0x3ff}, {&(0x7f0000000200)="cb89d4b048020a60eb37b2083d06b136775435aab4daaf4bb954d2cfc4c18c7d04e3062864416dab28fa29a5b3d4fc60f082cb92961bb004fef5c483af4904a20f6b66d419061681c1f5fb10f9e89726094c8ec7a155e718ea27", 0x5a, 0x6}, {&(0x7f0000000280)="e2bbeda64db51787b39cd0f8ce5a47a9f191d2f63c1e627c9fcb5a0c14bf108093", 0x21}, {&(0x7f00000002c0)="35e8df0816204f9d9c15c09ba2c0c9aefd4318be94993abd70bb5478601953b66c48db1ea872a270f1dd3f6a835d1dbd777ad8140a529695de61bb82d45e20d6115ecd5783173afb9c0f2e3099e21c91718ee2e48f9aa51f9a7e3361667359ec4d33915e91374c70c9204bb159881e8ae42be59e0ab36d90dc3ffcf5d448f7f0f4da37780dc239363cefcf5d8e503cd60fac5d4c9ac61261a296f8213561e458a657b013366a0e0580fef4f6d2d1120b84409b426acc387caee74a22720300af7a217ec705432ca4e1acddc42be5fd91093fb9f64789523e7b8bbbd6352844874d1fa8", 0xe3, 0x1}, {&(0x7f00000003c0)="7fb05bce3fac9e92e91a377eafbe7904abac64e974a5330970455e43c1353df1a3af0ab296e16ffea8c093cdb377f9e90e65f8a274b72d349cdf7c80ddd1c82ce2fa4e02d4c8478a84a3f159ffeb6a3eb1fe34d591b13290f2065ee1371e604ded04dd7d0c344e67ecc5e5c66f353e14d29901d0cdbc5fe3d568a9a4db080301efcd84b3efb9c96cf3ecd089f8f2b808c429978ba2c71a348ef8a2b7b4f1b814ff0cf65a85d67674ae13ad398e2410b9ec3e99430cee284f20d6fd12598e603ec4e3d3268dd98758711730f13e9b9d223673a195bfe48c7888b73814403b15", 0xdf, 0xffff}, {&(0x7f00000004c0)="ecf45f5f0fb67892f4e0ce8cd13444127dc0a87e01a674253f968581e199591ce369956d8061c34d43c11d07f73ad64346be16986e31890c9bc75c68e76a6ab7b8b94900522c9b110aa9c68b738cdc7ff79157bad7ff06c18b644d108c9c807c42a43780a1c08db5d32faf66898764188352fd3802f17d3d35ed1d9652307d8c9c06c56f62cac6f78986f40861421c2e7002e535640c4afeb0755aca7fcaff", 0x9f, 0x2}], 0x2, &(0x7f0000000640)={[{@session={'session', 0x3d, 0x3}}, {@gid={'gid', 0x3d, r1}}, {@creator={'creator', 0x3d, "734787b4"}}, {@creator={'creator', 0x3d, "994a394d"}}, {@nobarrier='nobarrier'}, {@barrier='barrier'}, {@force='force'}], [{@smackfstransmute={'smackfstransmute'}}, {@measure='measure'}, {@uid_gt={'uid>', r2}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r3 = syz_open_dev$usb(&(0x7f0000000700)='/dev/bus/usb/00#/00#\x00', 0x0, 0x551000) openat$cuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cuse\x00', 0x2, 0x0) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x26) 08:29:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) sendto$rose(r2, &(0x7f0000000040)="860fe2b326a7ac4707bba5b78d04907401948f4e2135dd3753ce3244eb9a5c0aed48c4a57ee3de5d8a54359fc04691a56e77336666", 0x35, 0x4, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) [ 224.975231] input: syz1 as /devices/virtual/input/input9 [ 225.048095] input: syz1 as /devices/virtual/input/input10 08:29:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:16 executing program 3: socket$kcm(0x2, 0x4000000002, 0x73) semop(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000040)=[{0x9, 0xfffffffffffffe01, 0x100000000, 0x81}, {0x8, 0x81, 0x0, 0x101}, {0x10000, 0x7855, 0x2, 0x9}, {0x3f, 0xff, 0x707af838}, {0x9, 0x5, 0x9}, {0x4, 0x0, 0x9}, {0x7, 0x3, 0x2df7, 0x7}, {0x6, 0x401, 0x9, 0x55}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) connect$pppoe(r2, &(0x7f00000001c0)={0x18, 0x0, {0x0, @remote, 'bridge_slave_1\x00'}}, 0xffffffffffffffed) 08:29:16 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = accept4(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000000c0)=0x80, 0x80000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000100)=0x80000001, 0x4) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000080), 0x4) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) 08:29:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:16 executing program 4: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x181840, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000180)={0x5, "758d78366fc04403f12e82713fef1d2dcf34e4809c48e4758136479473f5fd06", 0x1, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x725, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) 08:29:16 executing program 1: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x181840, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000180)={0x5, "758d78366fc04403f12e82713fef1d2dcf34e4809c48e4758136479473f5fd06", 0x1, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x725, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) [ 225.529248] input: syz1 as /devices/virtual/input/input11 08:29:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:17 executing program 3: socket$kcm(0x2, 0x4000000002, 0x73) semop(0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000180)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x8, &(0x7f0000000040)=[{0x9, 0xfffffffffffffe01, 0x100000000, 0x81}, {0x8, 0x81, 0x0, 0x101}, {0x10000, 0x7855, 0x2, 0x9}, {0x3f, 0xff, 0x707af838}, {0x9, 0x5, 0x9}, {0x4, 0x0, 0x9}, {0x7, 0x3, 0x2df7, 0x7}, {0x6, 0x401, 0x9, 0x55}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:17 executing program 1: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x181840, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000180)={0x5, "758d78366fc04403f12e82713fef1d2dcf34e4809c48e4758136479473f5fd06", 0x1, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x725, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) 08:29:17 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)=@delpolicy={0xd8, 0x14, 0x324, 0x70bd2b, 0x25dfdbfb, {{@in6=@rand_addr="346111a37e0c9a48aba3f6c45243b7bf", @in=@broadcast, 0x4e20, 0x4, 0x4e24, 0x7, 0x0, 0x80, 0x20, 0x5c, r2, r3}, 0x6e6bbe, 0x2}, [@sec_ctx={0x58, 0x8, {0x53, 0x8, 0x1, 0x461651ed, 0x4b, "10a75e9a2d48c252de6067aea56a8ac2b4061c0ed91e2c475b3c6f1359f47fa79ad961fc0b4a578e88a6f2012bcb609e2bb9677f4b7e337a380638ba2cd2eeef43512f15ef54c015404c2e"}}, @ipv4_hthresh={0x8, 0x3, {0x1c, 0x9}}, @address_filter={0x28, 0x1a, {@in6=@local, @in6=@mcast2, 0x2, 0x1, 0xffffffffffffffff}}]}, 0xfffffffffffffebc}, 0x1, 0x0, 0x0, 0x4000000000000}, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x14, &(0x7f00000000c0)={0x0, 0x0}, 0x10) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2a) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r5, 0x100, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x8c5, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}}, 0x40040) 08:29:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:17 executing program 1: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x181840, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000180)={0x5, "758d78366fc04403f12e82713fef1d2dcf34e4809c48e4758136479473f5fd06", 0x1, 0x1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x725, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xffffffff00000000) 08:29:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xffff, 0x80002) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000031c0)={0x0, @multicast2, @loopback}, &(0x7f0000003200)=0xc) bind$packet(r1, &(0x7f0000003240)={0x11, 0x0, r2, 0x1, 0xa4a0, 0x6, @dev={[], 0x11}}, 0x14) r3 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x800, r4, 0x1, 0x0, 0x6, @local}, 0x14) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x200002) bind$packet(r3, &(0x7f0000000000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="c59404c4996a"}, 0x14) 08:29:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000001200)=ANY=[@ANYBLOB="180000183000ffff00000000bc4300400000000004c3f5c4e417dc4a0001008f633fec9dca907f7d8a47acb67526e5ab3e9f7752e7b217f38687916b89d58adebfd084c1ef04f7e2d52b092ff6bac96ac9ceb80782a8cba4a1b5c54c9a0bfd38ed0eebcbebaa302a1a0d1affee5580fec218dfa46be9ef6226a9abfd982b5a3137000000000000"], 0x18}}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001300)='TIPCv2\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000001440)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000001400)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x400006}, 0xc, &(0x7f00000013c0)={&(0x7f0000001340)={0x50, r3, 0x308, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40010}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000001100)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xffffffff000, 0x0, "530a72bea036227eb16b058ec4a6277b7bb4603ec0c1595e8918a058d0a775b5f370888d93683d20b63accc5120363a41d1a0010522679050a6b3764ed4f1115ee073286cd6952530792f1f218def2e6"}, 0xd8) [ 226.334537] input: syz1 as /devices/virtual/input/input12 08:29:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 08:29:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x3f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="095afd3d3d86d0fa9e370417483dca7bc986399c2bb2fa7b6559a2a476ac0fd95d375f2b5ec11c63d689eb217f4eeb927221c84a4539d54b4932c3be5121b5da2ddbb3ea456d75ef4bb1b8fdfee404285c3daacf1f55925df99d42a4069ec110a42993a32bee3ab62c8ad6e99299589833688d87367c457b996a2eb2d8c11352", 0x80, 0x7ff}], 0x40020, &(0x7f0000000380)={[{@quota_off='quota=off'}, {@localflocks='localflocks'}, {@data_ordered='data=ordered'}, {@norecovery='norecovery'}, {@data_ordered='data=ordered'}, {@errors_withdraw='errors=withdraw'}, {@noquota='noquota'}, {@noloccookie='noloccookie'}], [{@euid_eq={'euid', 0x3d, r1}}, {@fowner_gt={'fowner>', r2}}, {@dont_measure='dont_measure'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x313, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000100)='GPL\x00'}, 0x48) 08:29:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) ioctl$UI_DEV_CREATE(r2, 0x5501) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:17 executing program 1: open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x12, "e2ce8437f62ae86b600c495440de808891f0"}, &(0x7f0000000200)=0x1a) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x2}, 0x98) removexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)=@known='com.apple.FinderInfo\x00') socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, 0x0, &(0x7f0000000100)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x1}, 0x8) creat(0x0, 0x0) 08:29:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:18 executing program 4: clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000003c00)) r0 = gettid() creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0xffffff, 0x12, r1, 0x2) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r2, 0x1, &(0x7f0000000180)={{}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x15) [ 226.732491] input: syz1 as /devices/virtual/input/input13 08:29:18 executing program 3: seccomp(0x1, 0x1, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x10001, 0xe2a, 0xed6}, {0x96be, 0x7, 0x7ff, 0x200}, {0x5, 0x4, 0x5e0, 0x7fff}, {0x7, 0x8240, 0x6380, 0x2}]}) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7, 0x10400) seccomp(0x1, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) seccomp(0x1, 0x1, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) 08:29:18 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x400000001ffd) r1 = dup(r0) mmap$binder(&(0x7f0000856000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) 08:29:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) r2 = dup(r0) getpeername$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) [ 226.868317] kauditd_printk_skb: 1 callbacks suppressed [ 226.868326] audit: type=1400 audit(1562056158.132:86): avc: denied { map } for pid=9945 comm="syz-executor.1" path="/dev/dri/card3" dev="devtmpfs" ino=37404 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:device_t:s0 tclass=file permissive=1 08:29:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@rand_addr="5bcc691cc3a499606c6c8a378edd1a8a"}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x20000, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x90) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000002c0)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @rand_addr=0x6a9}, {0x2, 0x4e24, @loopback}, 0x280, 0x0, 0x0, 0x0, 0x1f, &(0x7f0000000280)='bcsh0\x00', 0xfffffffffffeffff, 0xbcf, 0x9}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000340)=0x9) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000240)={0x0, 0x0}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 226.922524] audit: type=1804 audit(1562056158.182:87): pid=9950 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir712442260/syzkaller.8iOnPq/104/bus" dev="sda1" ino=16596 res=1 08:29:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 228.244487] bridge0: port 3(gretap0) entered disabled state [ 228.275446] device gretap0 left promiscuous mode [ 228.296673] bridge0: port 3(gretap0) entered disabled state [ 228.534267] device bridge_slave_1 left promiscuous mode [ 228.540080] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.611055] device bridge_slave_0 left promiscuous mode [ 228.616689] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.932834] device hsr_slave_1 left promiscuous mode [ 228.987159] device hsr_slave_0 left promiscuous mode [ 229.097595] team0 (unregistering): Port device team_slave_1 removed [ 229.147660] team0 (unregistering): Port device team_slave_0 removed [ 229.181896] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 229.228929] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 229.351671] bond0 (unregistering): Released all slaves 08:29:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:21 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, &(0x7f0000000100)) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r2, 0x1, 0x0, 0x369e5d84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000001c0)='./bus\x00', 0x0) 08:29:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/2, &(0x7f0000000080)=0x2) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) sync() write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:21 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)=r1) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000001c0)=r1) 08:29:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x100, 0x3}) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:21 executing program 3: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r2, 0x2, &(0x7f0000000100)=[0xffffffffffffff81, 0x0], &(0x7f0000000140)=[0xfffffffffffffff9, 0x8000], 0x0, 0x1, 0x5, &(0x7f0000000180)=[0x9], &(0x7f00000001c0)=[0x7fffffff]}) tkill(r0, 0xd) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="aa"], 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:29:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 233.150235] IPVS: ftp: loaded support on port[0] = 21 [ 233.532036] chnl_net:caif_netlink_parms(): no params data found [ 233.567074] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.573953] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.581533] device bridge_slave_0 entered promiscuous mode [ 233.588334] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.594895] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.602001] device bridge_slave_1 entered promiscuous mode [ 233.620396] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 233.629376] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 233.648458] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 233.655875] team0: Port device team_slave_0 added [ 233.661779] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 233.668936] team0: Port device team_slave_1 added [ 233.674370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.681644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 233.762455] device hsr_slave_0 entered promiscuous mode [ 233.800373] device hsr_slave_1 entered promiscuous mode [ 233.881435] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 233.888384] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 233.903823] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.910240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.917012] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.923422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.955026] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 233.961942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.970477] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.979021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.986942] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.994081] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.005337] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 234.011743] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.020435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.028052] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.034451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.044021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.051822] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.058256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.075012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.083579] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.097987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.107786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.117940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.128073] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 234.134570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.148076] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 234.158364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.530873] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 08:29:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:26 executing program 3: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r2, 0x2, &(0x7f0000000100)=[0xffffffffffffff81, 0x0], &(0x7f0000000140)=[0xfffffffffffffff9, 0x8000], 0x0, 0x1, 0x5, &(0x7f0000000180)=[0x9], &(0x7f00000001c0)=[0x7fffffff]}) tkill(r0, 0xd) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="aa"], 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:29:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:27 executing program 0: dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:27 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) getpeername$ax25(r0, &(0x7f0000000040)={{0x3, @default}, [@rose, @netrom, @rose, @remote, @default, @bcast, @remote, @default]}, &(0x7f00000000c0)=0x48) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100)=0x3, 0x2) chmod(&(0x7f0000000140)='./file0\x00', 0x90) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x3042000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r1, 0x301, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x4091) setsockopt$sock_int(r0, 0x1, 0x26, &(0x7f0000000300)=0x81, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x404, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff80000000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x40) rt_sigprocmask(0x0, &(0x7f0000000480)={0x10001}, 0x0, 0x8) connect$vsock_dgram(r0, &(0x7f00000004c0), 0x10) lookup_dcookie(0x5, &(0x7f0000000500)=""/72, 0x48) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') r3 = syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000640)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000740)=0xe8) recvmsg$kcm(r0, &(0x7f0000000a80)={&(0x7f0000000880)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000900)=""/50, 0x32}, {&(0x7f0000000940)=""/13, 0xd}], 0x2, &(0x7f00000009c0)=""/161, 0xa1}, 0x21) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000cc0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000c80)={&(0x7f0000000ac0)={0x188, r3, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x16c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}]}, 0x188}}, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) read$rfkill(r0, &(0x7f0000000d00), 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f00)={&(0x7f0000000d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x7}}, @const={0xf}, @enum={0xa, 0x8, 0x0, 0x6, 0x4, [{0x8, 0xcf7b}, {0xd, 0x2}, {0x3, 0xde}, {0x4, 0x26e}, {0x9, 0x400}, {0x2, 0x100000001}, {0x5, 0x100000001}, {0xf, 0x6}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x1, 0x8}}]}, {0x0, [0x5f, 0x6f, 0x7f, 0x5f]}}, &(0x7f0000000e00)=""/197, 0xa6, 0xc5}, 0x20) name_to_handle_at(r0, &(0x7f0000000f40)='./file1\x00', &(0x7f0000000f80)={0x45, 0x4, "fc22ca89642e7a0f7fc42ec7b283460644ca9b2213e04f7488bb3801dab4ecf7cb0b1cfbbe0fab4fbe61ecccc4b03d59138efd5427982f67b60f0283f2"}, &(0x7f0000001000), 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000001040), &(0x7f0000001080)=0x4) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f00000010c0)=0x31, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000001100)='(\x00', r0}, 0x10) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000001180)={0x7d, 0x0, [0xc05, 0x1, 0x1, 0x1f]}) execve(&(0x7f0000001200)='./file1\x00', &(0x7f0000001280)=[&(0x7f0000001240)='/dev/snapshot\x00'], &(0x7f0000001380)=[&(0x7f00000012c0)='broadcast\x00', &(0x7f0000001300)='/dev/snapshot\x00', &(0x7f0000001340)='\x00']) write$P9_RWALK(r0, &(0x7f00000013c0)={0x23, 0x6f, 0x2, {0x2, [{0x20, 0x3, 0x5}, {0x10, 0x0, 0x4}]}}, 0x23) 08:29:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:27 executing program 0: dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:29 executing program 3: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r2, 0x2, &(0x7f0000000100)=[0xffffffffffffff81, 0x0], &(0x7f0000000140)=[0xfffffffffffffff9, 0x8000], 0x0, 0x1, 0x5, &(0x7f0000000180)=[0x9], &(0x7f00000001c0)=[0x7fffffff]}) tkill(r0, 0xd) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="aa"], 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:29:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:29 executing program 1: unshare(0x10000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r2, 0x4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') pause() openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) setns(r3, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f00000000c0)={0x5, @raw_data="c0d69893023681b70d0221a75376e01216e1399c019df7886dc94e92c45aed59be092be5b284e062fc27c9b3374a44932b4b3d9f007e57a6829a2731c9cadbaff7bed96d96afd01cc908430434ab93cb5235a808ee2c8aa653801ef2b94c86297b0e6244c42c06d0c37dc4e0b5fbc51a7e5b9581b30d16e737c8dca6d7355a5c64ed3e19c7a9b071d87a4b8cbe23dfa28d29d8dbd5cc7dd67e1b88c678fd24c610e43ca4b5c9e967a883afd5622396ad876b4292c47eeb20006b9bceafc0c0995b142bbe02299fb8"}) 08:29:29 executing program 0: dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000180)={0xf, 0x1f, 0x2, 0x5b927296}, 0xf) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:30 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:30 executing program 4: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x8000) 08:29:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:32 executing program 3: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000200)={r2, 0x2, &(0x7f0000000100)=[0xffffffffffffff81, 0x0], &(0x7f0000000140)=[0xfffffffffffffff9, 0x8000], 0x0, 0x1, 0x5, &(0x7f0000000180)=[0x9], &(0x7f00000001c0)=[0x7fffffff]}) tkill(r0, 0xd) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="aa"], 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 08:29:32 executing program 4: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000007c0)={&(0x7f0000000400), 0xc, &(0x7f0000000780)={&(0x7f0000000480)={0x2fc, r1, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x43}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffe}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffff7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x467b}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0xb4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3, @mcast1, 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @rand_addr="5bfd473e9a440e59d1e285e367e725b6", 0x10000}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8, @mcast2, 0x8}}}}]}]}, 0x2fc}, 0x1, 0x0, 0x0, 0x40000}, 0x24004000) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") r2 = memfd_create(&(0x7f0000000a00)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\xae!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55n\xd1~\x7f\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811A\x98G\x87j\x02\x8cC\xed#\xb8+\xf2G6\xe5\xe8\x88<2\x92\x13&\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)7R\x1f\xd7\xea\xc2\x8b\xb7\xb3\xf4\xa7\xf1\x05\xea\xa6\x13D\xd2C\x98#5\xd6\x1dh(\xc7\xfe_-\x88\x86\xb4DP\x97\xd3J\xb5\xb5\xe4\x84\x84\x06\xcd\xa59\x9e\x1f\xb4\x03\xce1XP|T%\xfa\xb9\xf5\xc2\xbb\x9b\xc8Q\n\xd9\x86l\xf2\x98\x8dC\xa5\xb8\xe9N1;\xc0[\xd5\xa8K\xfdE\x86\xb3\xf7?\xd9\xdeu\x10\x8fe\xfa\xe2c\x0ep\x9c\xb0\x80\x8e\x82\x1dz\xd5\x95\xff\xbc\xc7\xc8\xf7\xb7\x1e%\xd9\x8c\xf0<5a\xe8\xd2\nnO\xb4F\xe5\x8e\x1a\xcdc3\xe8\x85@j\x96Kk\xdc\xbfyB\xc0\xf4N\r\xd2w\xda\xe4\xa8]\xc0\xb9\xe5qJn\x91f8uxi\x04\r\x89\x8e8\xf7\xcc\x13E\xcc\x1b\xf4tK\x8ao\t\xb4\xc2?\xa6\xf0\xf9\x86/\x9d\xee\x9f\xb8x(\x1d\x90\xac=\xd6', 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000040)={0x1}, 0x2e8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_score_adj\x00') write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f00000001c0)={0x1f1, 0x3, 0x0, {0x1, 0x1d0, 0x0, '/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\xae!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55n\xd1~\x7f\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811A\x98G\x87j\x02\x8cC\xed#\xb8+\xf2G6\xe5\xe8\x88<2\x92\x13&\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)7R\x1f\xd7\xea\xc2\x8b\xb7\xb3\xf4\xa7\xf1\x05\xea\xa6\x13D\xd2C\x98#5\xd6\x1dh(\xc7\xfe_-\x88\x86\xb4DP\x97\xd3J\xb5\xb5\xe4\x84\x84\x06\xcd\xa59\x9e\x1f\xb4\x03\xce1XP|T%\xfa\xb9\xf5\xc2\xbb\x9b\xc8Q\n\xd9\x86l\xf2\x98\x8dC\xa5\xb8\xe9N1;\xc0[\xd5\xa8K\xfdE\x86\xb3\xf7?\xd9\xdeu\x10\x8fe\xfa\xe2c\x0ep\x9c\xb0\x80\x8e\x82\x1dz\xd5\x95\xff\xbc\xc7\xc8\xf7\xb7\x1e%\xd9\x8c\xf0<5a\xe8\xd2\nnO\xb4F\xe5\x8e\x1a\xcdc3\xe8\x85@j\x96Kk\xdc\xbfyB\xc0\xf4N\r\xd2w\xda\xe4\xa8]\xc0\xb9\xe5qJn\x91f8uxi\x04\r\x89\x8e8\xf7\xcc\x13E\xcc\x1b\xf4tK\x8ao\t\xb4\xc2?\xa6\xf0\xf9\x86/\x9d\xee\x9f\xb8x(\x1d\x90\xac=\xd6'}}, 0x1f1) nanosleep(&(0x7f0000000080), 0x0) 08:29:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:32 executing program 1: unshare(0x10000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r2, 0x4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') pause() openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) setns(r3, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f00000000c0)={0x5, @raw_data="c0d69893023681b70d0221a75376e01216e1399c019df7886dc94e92c45aed59be092be5b284e062fc27c9b3374a44932b4b3d9f007e57a6829a2731c9cadbaff7bed96d96afd01cc908430434ab93cb5235a808ee2c8aa653801ef2b94c86297b0e6244c42c06d0c37dc4e0b5fbc51a7e5b9581b30d16e737c8dca6d7355a5c64ed3e19c7a9b071d87a4b8cbe23dfa28d29d8dbd5cc7dd67e1b88c678fd24c610e43ca4b5c9e967a883afd5622396ad876b4292c47eeb20006b9bceafc0c0995b142bbe02299fb8"}) 08:29:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:32 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='syz_tun\x00', 0x126) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth0_to_bridge\x00', 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) 08:29:33 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:35 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:35 executing program 1: unshare(0x10000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000002c0)=r2, 0x4) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') pause() openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) setns(r3, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f00000000c0)={0x5, @raw_data="c0d69893023681b70d0221a75376e01216e1399c019df7886dc94e92c45aed59be092be5b284e062fc27c9b3374a44932b4b3d9f007e57a6829a2731c9cadbaff7bed96d96afd01cc908430434ab93cb5235a808ee2c8aa653801ef2b94c86297b0e6244c42c06d0c37dc4e0b5fbc51a7e5b9581b30d16e737c8dca6d7355a5c64ed3e19c7a9b071d87a4b8cbe23dfa28d29d8dbd5cc7dd67e1b88c678fd24c610e43ca4b5c9e967a883afd5622396ad876b4292c47eeb20006b9bceafc0c0995b142bbe02299fb8"}) 08:29:36 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:36 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, 0x0, &(0x7f0000000100)='/dev/uinput\x00', 0xc, 0x0) 08:29:36 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:37 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x410002, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000040), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) 08:29:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:37 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:37 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x410002, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000040), 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) 08:29:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:37 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) ftruncate(0xffffffffffffffff, 0x10099b7) sendfile(r5, 0xffffffffffffffff, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:38 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) [ 247.180715] FAULT_INJECTION: forcing a failure. [ 247.180715] name failslab, interval 1, probability 0, space 0, times 0 [ 247.254466] CPU: 1 PID: 10397 Comm: syz-executor.1 Not tainted 4.14.131 #25 [ 247.261621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.271079] Call Trace: [ 247.273699] dump_stack+0x138/0x19c [ 247.277341] should_fail.cold+0x10f/0x159 [ 247.281497] should_failslab+0xdb/0x130 [ 247.285485] __kmalloc+0x2f0/0x7a0 [ 247.289583] ? inode_has_perm.isra.0+0x15c/0x1e0 [ 247.294378] ? simple_xattr_alloc+0x31/0xa0 [ 247.298963] simple_xattr_alloc+0x31/0xa0 [ 247.303135] simple_xattr_set+0x3f/0x590 [ 247.307242] shmem_xattr_handler_set+0x42/0x50 [ 247.311853] ? shmem_file_llseek+0x250/0x250 [ 247.316283] __vfs_setxattr+0xd8/0x130 [ 247.320291] ? xattr_resolve_name+0x360/0x360 [ 247.324809] ? evm_protect_xattr.isra.0+0x74/0x360 [ 247.329742] __vfs_setxattr_noperm+0x102/0x3c0 [ 247.334337] vfs_setxattr+0xc5/0xf0 [ 247.337954] setxattr+0x1de/0x350 [ 247.341604] ? vfs_setxattr+0xf0/0xf0 [ 247.345431] ? __lock_is_held+0xb6/0x140 [ 247.349502] ? check_preemption_disabled+0x3c/0x250 [ 247.354529] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 247.360719] ? preempt_count_add+0xbc/0x1a0 [ 247.365061] ? __mnt_want_write+0x1e3/0x270 [ 247.369401] ? __mnt_want_write_file+0x7f/0xc0 [ 247.373979] SyS_fsetxattr+0x127/0x190 [ 247.377858] ? SyS_lsetxattr+0x50/0x50 [ 247.381737] do_syscall_64+0x1e8/0x640 [ 247.385625] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 247.390506] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 247.395850] RIP: 0033:0x4597c9 08:29:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:38 executing program 1 (fault-call:2 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) [ 247.399026] RSP: 002b:00007fb20bfc2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 247.406758] RAX: ffffffffffffffda RBX: 00007fb20bfc2c90 RCX: 00000000004597c9 [ 247.414051] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 247.421341] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 247.428614] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb20bfc36d4 [ 247.435893] R13: 00000000004cb658 R14: 00000000004d2018 R15: 0000000000000004 08:29:38 executing program 0: clone(0x200020000820100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x80) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'ip6erspan0\x00', 0x1000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x7) ptrace$cont(0x1f, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x80, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x2000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000080)=""/196) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:29:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(0xffffffffffffffff, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 247.844450] FAULT_INJECTION: forcing a failure. [ 247.844450] name failslab, interval 1, probability 0, space 0, times 0 [ 247.876447] CPU: 1 PID: 10419 Comm: syz-executor.1 Not tainted 4.14.131 #25 [ 247.883866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:29:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) [ 247.893258] Call Trace: [ 247.895865] dump_stack+0x138/0x19c [ 247.895897] should_fail.cold+0x10f/0x159 [ 247.895916] should_failslab+0xdb/0x130 [ 247.895934] __kmalloc_track_caller+0x2ec/0x790 [ 247.903908] ? inode_has_perm.isra.0+0x15c/0x1e0 [ 247.917579] ? simple_xattr_set+0x5d/0x590 [ 247.921831] kstrdup+0x3a/0x70 [ 247.925057] simple_xattr_set+0x5d/0x590 [ 247.929269] shmem_xattr_handler_set+0x42/0x50 [ 247.933876] ? shmem_file_llseek+0x250/0x250 [ 247.938301] __vfs_setxattr+0xd8/0x130 [ 247.942206] ? xattr_resolve_name+0x360/0x360 [ 247.946721] ? evm_protect_xattr.isra.0+0x74/0x360 [ 247.951670] __vfs_setxattr_noperm+0x102/0x3c0 [ 247.956363] vfs_setxattr+0xc5/0xf0 [ 247.960059] setxattr+0x1de/0x350 [ 247.963524] ? vfs_setxattr+0xf0/0xf0 [ 247.967430] ? __lock_is_held+0xb6/0x140 [ 247.971505] ? check_preemption_disabled+0x3c/0x250 [ 247.976537] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 247.982122] ? preempt_count_add+0xbc/0x1a0 [ 247.986658] ? __mnt_want_write+0x1e3/0x270 08:29:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 247.990999] ? __mnt_want_write_file+0x7f/0xc0 [ 247.995603] SyS_fsetxattr+0x127/0x190 [ 247.999504] ? SyS_lsetxattr+0x50/0x50 [ 248.003395] do_syscall_64+0x1e8/0x640 [ 248.007274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.012144] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 248.017324] RIP: 0033:0x4597c9 [ 248.020518] RSP: 002b:00007fb20bfc2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 248.028307] RAX: ffffffffffffffda RBX: 00007fb20bfc2c90 RCX: 00000000004597c9 [ 248.035565] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 08:29:39 executing program 1 (fault-call:2 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) [ 248.042920] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 248.050528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb20bfc36d4 [ 248.057790] R13: 00000000004cb658 R14: 00000000004d2018 R15: 0000000000000004 08:29:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:39 executing program 0: mkdir(0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') open(&(0x7f0000000180)='./file0\x00', 0x40, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, &(0x7f0000000140)) syz_emit_ethernet(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 08:29:39 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000100)={r1, 0x21}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x4f5c13b5) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r2, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:39 executing program 0: r0 = creat(0x0, 0x3) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x2, 0x0, @local}, 0xfffffe91) r2 = syz_open_dev$usbmon(0x0, 0x40, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f0000000380)={@local}) stat(0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/55) accept(0xffffffffffffffff, &(0x7f0000000500)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000580)=0x80) getsockopt$inet6_int(r0, 0x29, 0x7f, 0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000006c0)) write$binfmt_elf32(r0, &(0x7f0000000980)={{0x7f, 0x45, 0x4c, 0x46, 0xb75, 0x9, 0x8, 0x0, 0x5a, 0x0, 0x3e, 0x9, 0x0, 0x38, 0xa2, 0x4, 0x80000000, 0x20, 0x2, 0x87df, 0x6, 0x10001}, [{0x6474e555, 0x0, 0x0, 0x0, 0x5, 0x8049d31, 0x1, 0x9346}], "0214016bc0e793b534c1b4590f08ff4cdde2fbf76784f10df1c4af25c03b8a80c1e30a7f353749fa4068437dd846c3319b8505a4087cf556fc5b6dab878b78dcee253cf8ae4bf0544bc96745ba7272a80c578914f1dc97"}, 0xaf) ioctl$HCIINQUIRY(0xffffffffffffffff, 0x800448f0, &(0x7f0000000700)={0x0, 0x7, 0x0, 0x8001, 0x4, 0x4}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4), 0x1c) gettid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) get_robust_list(r4, 0x0, &(0x7f0000000480)) splice(0xffffffffffffffff, &(0x7f0000000300), r1, &(0x7f0000000340), 0xa31a, 0x8) 08:29:39 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="80000000b276b178122329aeef261a8adff487b6b6cb3dec5bd3f28a9cabf4d3ea9444bb8f5ec9cba2b69363576db0d79b87300707dbc1d7aa799ff5bd18f002affe5a3d1dad72c3e14b7f37c3ebbd2c9c0e8cf035fbf0b120d8b412a38b9911a1490cf2233708f3c5c5062e7e402dd07b9ce03604763a7d43471980d5c683aa7467444a"], &(0x7f00000002c0)=0x88) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x8000000}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000100)={r2, 0x10e4e7d7, 0x6, 0x1ff, 0xe3, 0x3, 0x6, 0x2622, {0x0, @in={{0x2, 0x5, @remote}}, 0x8, 0x10001, 0x8, 0x5, 0x5}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x0, 0x6}, &(0x7f00000001c0)=0x8) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x40000000002) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x7417}) r3 = dup3(r1, r0, 0x0) write$UHID_INPUT(r3, &(0x7f0000000140)={0x8, "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", 0x1000}, 0xa80) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x7fffffff}) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001180)=""/150, 0x96}], 0x1) 08:29:40 executing program 1: socketpair(0x7, 0x8000e, 0x7, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000100)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x0) 08:29:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:40 executing program 0: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000000)={0x2d0}, 0x7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x100000000000) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='.\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d58bbd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 08:29:40 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r0 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='s\x02cur!ty.SMACK64IPOUT\xdc', 0x0, 0xfffffffffffffd17, 0x10000000002) 08:29:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000100)={r1, r0, 0x800}) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x20000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x103000) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.origin\x00') r3 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x78) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) r4 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='\x00', 0x0) keyctl$revoke(0x3, r4) 08:29:40 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@loopback, 0x0, 0x1}, 0x20) 08:29:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffffd) connect$unix(0xffffffffffffffff, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:41 executing program 0: memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/4\x00') preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/135, 0x87}], 0x1, 0x10) 08:29:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x804, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x3) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000000)={0xffffffff00000001, 0x9, 0x2b, "740c6db6cfaa2d1769bfb20f234f81e7efe21c15d8436035a86bb45e11bc30c9b892bb54074a1d05505fe82448cc54f09cc694d28dd8e5cc0c900c47", 0x29, "67ea0856da45786281f69200005dd04185618df256a39b6275a7d9e4f5c9c7b070ffb58360881820b11e48c89f0958fc270b17449e98f9a83925265e"}) 08:29:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffffd) connect$unix(0xffffffffffffffff, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x400, 0x70bd25}, 0x1c}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(0xffffffffffffffff, r5, 0x0, 0xfffffffd) connect$unix(0xffffffffffffffff, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0xd0, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000000)={0x0, {{0x10}}}, 0x90) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00835) 08:29:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00') fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x20, 0x1, 0x8}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) fsetxattr$security_smack_entry(r1, &(0x7f00000001c0)='security.SMACK64EXEC\x00', &(0x7f0000000200)='security.SMACK64\x00', 0x11, 0x3) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) poll(0x0, 0x0, 0x4e) recvfrom$inet(0xffffffffffffffff, 0x0, 0x10101, 0x0, 0x0, 0x800e00707) readv(0xffffffffffffffff, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000180)=""/37, 0x25}, {0x0}, {0xffffffffffffffff}, {0x0}], 0x4}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) execve(0x0, 0x0, 0x0) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}], 0x2) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x0) shutdown(r2, 0x0) shutdown(r0, 0x0) 08:29:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000180)={{0x80000000, 0x30a8f382}, {0x8, 0x100000000}, 0xa64, 0x4, 0x3}) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000003c0)={{0xffffffffffff7fff, 0x7ff}, {0x0, 0x5}, 0x6, 0x0, 0x2}) r3 = request_key(&(0x7f0000000300)='blacklist\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='security.SMACK64\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r2, &(0x7f0000000280)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'trusted:', 'security.SMACK64\x00', 0x20, 0x40, 0x20, [0x34, 0x0, 0x63]}, 0x41, r3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x10001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={r4, 0xa5, 0x30, 0x0, 0xee98}, &(0x7f0000000140)=0x18) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:41 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x806, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000080)=""/157, 0x9d}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x4e5cc83, 0x0, 0x0, 0x800e00549) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/117, 0x75}], 0x1}, 0x40042) shutdown(r0, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) recvfrom$inet(r2, 0x0, 0x3c7, 0x2, 0x0, 0x800e00545) shutdown(r2, 0x0) 08:29:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:42 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x8}, 0xf) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xe4, "3191f5895c11de0696b2c3946cdb49ab02db93c0a7f252f07cb00a2ecfcb6b4921ca732b1347c1cb49d47c5f96a6269070877a2910e53fba12af420bdbb0d091347ce152ef18479deb36604aeb55e99339a8a3e6599456fbc40b7d41033218eb29b48e7bfd9fc1942c86b47c3b1302c2221b70349e75d6082d983eccfd9a4238aa26d78778f63680d2dd76304cd4090beda86e2008385696e435574a3f6c326703504ee74eb819f698cf0fa629515f10dcf0e5e27a2415eadecf537d94cd1d450ec3fa8a5206b41b0ec46469d624a47835ef4759060859e6b15bf3f824c0a33099eef92f"}, &(0x7f00000000c0)=0xec) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r1, 0x81, 0x10000}, 0xc) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r2, &(0x7f0000000100)='sEcurity.SMACK64\x00$\xcfF\xf9X\xa4]\xd0', 0x0, 0x0, 0x0) 08:29:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/41, 0x29}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/236, 0xec}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000200)=""/61, 0x3d}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r4, 0x0) shutdown(r1, 0x0) 08:29:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:42 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x600000, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x17a, 0xffff, 0xffffffff, 0x5}, 0x19, [0xfff, 0x9, 0x2, 0xcb, 0x2, 0x200, 0x80000001, 0x78, 0x0, 0x1, 0x777e, 0x184dc3, 0x21, 0x4, 0x7fff, 0xe546, 0x4, 0x7, 0x8000, 0x3, 0x10001, 0x93, 0xffff, 0xa4, 0x7fffffff, 0x3, 0x5b2d, 0x7fffffff, 0x80000000, 0x20, 0x1, 0x1f, 0x0, 0x6, 0x2, 0x400, 0x3d, 0x8, 0x8, 0x100000000, 0x5, 0xab, 0xee, 0x0, 0x4, 0x401, 0x7, 0x9, 0x2, 0xd, 0x7, 0x9, 0x100000000, 0x5, 0x2, 0x5, 0x950, 0x20, 0x8, 0x9, 0x9, 0xffffffffffff0001, 0x5, 0x3], [0x6, 0x1, 0x0, 0x6, 0x7, 0x1, 0x0, 0x5, 0x3, 0x3, 0x7fff, 0xfffffffffffffffa, 0x5, 0x4, 0x3ba3, 0xfe6, 0x6, 0x9, 0x1, 0x1, 0xfffffffffffffff7, 0x6, 0x2, 0x2, 0x80000001, 0x3ff, 0x101, 0x0, 0x2, 0x4, 0x7fffffff, 0x2, 0x4, 0x8001, 0x3f00000000, 0x3, 0x5, 0x8, 0x0, 0x6, 0x9, 0x3, 0x100000, 0x1, 0x3f, 0x6, 0x400, 0x200, 0x0, 0x1, 0x1000, 0x4b0, 0x101, 0x0, 0x3f, 0xca, 0x100000000, 0x2, 0x8, 0x3f, 0x7fffffff, 0x0, 0xffffffffffffffff], [0x0, 0xfffffffffffff443, 0xbbe9, 0x8, 0x5, 0x3f, 0x7f, 0x8, 0x5, 0x1, 0x5, 0x4, 0x7, 0x5, 0x40, 0x100000001, 0xf6, 0x20, 0x784, 0x2, 0x4, 0x9, 0x200, 0x7f, 0x7, 0xfffffffffffffff7, 0x73232185, 0x0, 0x1, 0x1, 0x6, 0x0, 0x547b, 0xffff, 0x7, 0x6, 0x593aecdd, 0x7df, 0x2, 0x10001, 0x10001, 0x80, 0x9, 0x7, 0xff, 0x3, 0x2, 0xffffffff, 0x7e, 0x81, 0xf3, 0x1f, 0x5d1, 0x1000, 0x100000000, 0x5, 0x100000001, 0xf329, 0x9, 0x4800, 0x2, 0x513, 0x7, 0x8], [0x1, 0x100, 0x6, 0x4, 0x1ff, 0x8, 0x7, 0x6, 0x6, 0x4, 0x2e, 0xfff, 0x7ff, 0x1287, 0x1, 0x3, 0xc3, 0x7, 0x4, 0x1ff, 0x6, 0x6, 0x1f, 0x9, 0x7ff, 0x5, 0x200, 0x81, 0xbcf, 0x40, 0xffffffffffffffff, 0x10000, 0x8000, 0x7fffffff, 0x8, 0x5, 0x584, 0x401, 0x4, 0x4, 0x4, 0x1ff, 0x1, 0x4, 0x4, 0x4, 0x4c, 0x1000, 0xef, 0x9b4f, 0xfffffffffffffff9, 0x6, 0x400, 0xb318, 0x1, 0x5, 0x7ff, 0x3, 0x7, 0x1, 0x1, 0x6, 0x1000, 0x1]}, 0x45c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0xfffffffffffffffe, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000040)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffe3, 0x0, 0x0, 0x800e00505) shutdown(r0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x51, &(0x7f00000001c0)={0x5, {{0x10, 0x2}}}, 0x90) recvfrom$inet(r1, 0x0, 0x100000114, 0x0, 0x0, 0x800e00510) shutdown(r1, 0x0) 08:29:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1, 0x9, 0x7d, 0x3, 0x0, 0x401, 0x400, 0x7, 0x7fff, 0x4, 0x80000001, 0xffffffff7fffffff, 0x8, 0x0, 0x0, 0x8, 0x6, 0x2, 0x400, 0x859, 0x65, 0x5, 0x1af, 0x100000000, 0x8e, 0xfff, 0x9, 0x1, 0xffff, 0x1000, 0x8, 0x0, 0x4, 0x7, 0x95, 0x80000001, 0x0, 0x9, 0x2, @perf_config_ext={0x32cb, 0x3ff}, 0x200, 0x4, 0x6, 0x7, 0xff, 0x2, 0x9}, r2, 0xb, r1, 0xa) 08:29:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:42 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ftruncate(r1, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e007d5) 08:29:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:42 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x100010, r0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000140)=0x738a, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="40d02866d837765866a84025bb7410593095e4118a12ea13bd3e6946bfa153d800", 0x21) 08:29:43 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x800) ioctl$RTC_PIE_OFF(r0, 0x7006) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000180)) r1 = socket(0x10, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x1, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437, 0x9}}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) connect$rxrpc(r1, &(0x7f0000000100)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @remote}}, 0x24) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x8e1fe51a6236e621, &(0x7f0000000400), 0x0) 08:29:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x820208}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x94, r2, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x28}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r1}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1ff}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xb2d}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r1}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000884}, 0x8005) [ 251.876163] audit: type=1400 audit(1562056183.142:88): avc: denied { map } for pid=10694 comm="syz-executor.1" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 08:29:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:43 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000580)=""/17) 08:29:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7b") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0xa5) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:43 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfffffede) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000040)) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 08:29:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be0") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000200)=""/143) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='hN\x00\x00', @ANYRES16=r2, @ANYBLOB="01042abd7000fedbdf25010000000000000007410000004c001800000009696200"/98], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 08:29:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, 0x0) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be0") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:44 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000580)=""/17) 08:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x5}, 0x8) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be0") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, 0x0) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="69e2b549f8db6ddd8114baa47c48debadcfe14f63e094e3792cf7ce13cf247569cc373c7e0dad000998b61ba44427da4d48d66d130a16d7554d3717587d6c8b02d080cdfb62b36ac495207c61558bb7eee400e185b68cdf60b5b5ad5cf2407fca71c00660101ce656dbb42bdcda257267a71963a707733cc51805f61df7fb2e136bc2c507cfe7a155e81f607445d82cd146c74de021360cbc1e4743d15ad387499fb99518e87d0576cac754ac30fb5704000998d339cc6abc1347ca3206fa83a6530e1163bb43cfe2c10fea5ce"], 0x0, 0xcd}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xf5a, 0x800) 08:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:44 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000580)=""/17) 08:29:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, 0x0) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) syncfs(r1) socket(0x5, 0x80f, 0x80000000000ffff) 08:29:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:44 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000580)=""/17) 08:29:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x0, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:45 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="69e2b549f8db6ddd8114baa47c48debadcfe14f63e094e3792cf7ce13cf247569cc373c7e0dad000998b61ba44427da4d48d66d130a16d7554d3717587d6c8b02d080cdfb62b36ac495207c61558bb7eee400e185b68cdf60b5b5ad5"], 0x0, 0x5c}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$RTC_WIE_ON(r1, 0x700f) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) 08:29:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:45 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000140), 0xffffff35) 08:29:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f00000001c0)={0xf, 0x8, 0xfa00, {r2, 0xa}}, 0x10) r3 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x5, 0x4) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000040)={0x40, 0x8, 0x4, 0x40000, {0x77359400}, {0x3, 0x2, 0x7fffffff, 0x1f, 0xe000000000000000, 0x100000001, "ec7d8551"}, 0x9, 0x6, @offset=0x2, 0x4}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000200)={0x32}, 0x4) 08:29:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x0, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10rist\xe3cusgrVid:De', 0x0) 08:29:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:45 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:29:45 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3ff, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x0, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:45 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0xf7) 08:29:46 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200800, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000080)=0x9) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:46 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0xf7) 08:29:46 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) 08:29:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x200) r2 = dup(r0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64\x00', 0x0, 0x0, 0x2) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x4) 08:29:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x0, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x8, 0x4) 08:29:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x0, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='secur\xb6+b\x17\'\xca664\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\xcc/\xfa\xb4\x18b\xf5\xf3\xe6:\xcd\rj\x1b\xa0`U\xa4\xcf\x96\x8e\v\xf2E\xf4\x8b\xe83U\xd1\xf3\x9c?\xb1\xd7\xe9\xab!\x990\xf5\x02Q;;V\x88\xf3\x8c\xecH\x06\xe3\x85\xdb\xa8d\xb5\xd5\xf9\x16\x7f\xc0\xa8\t42\x0ede\xe5\xb5\xfeiLw\xde\xb7\xe4\xfan\xfe\xe4\xd3|\xbe\x92\xe1\x06\xae\xf6)0G\xa6o\x10\xb8A\xc1\xa6\x19Q\x1dTB\x96\x9e\xae\x9c\xd7\xcerki3\xe0=\xb7Z\r\x91;\x00NOH\x89\x10\xad*\x9e\xd4a\x1fm\'\xd1\xdd\xe0\xda\xf3O\x84\xe7j1J\x1c/\tM\x82.+?\xb4l\r\x03Y\xfb7\x92i\xf4\xf5\x86 \xd8p\xddx\xd1\x19\x82\x88\xa7\x04\xddV\x11\xe0>\xdd<|\x8enw\xe1\x91A\xab\x05:o\x7f\x1f\xe6Wg\x91\aB\xb2Z\x0e5\x8f\x86\x8b[\xff9\xdd\xc96\'F\xd5\n\xc9\x9d.\x1e2\xd2\xfb\x05\x89\x1dF\xac\xea\x15H\xfbS\x8e\x83-\xf9}n\xe1\xdd}\xc5C\xb9\xdef\x91\xcc3$\xa3\xa0\x81', 0x0, 0xfe83, 0x0) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x5}, 0xb) 08:29:46 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="69e2b549f8db6ddd8114baa47c48debadcfe14f63e094e3792cf7ce13cf247569cc373c7e0dad000998b61ba44427da4d48d66d130a16d7554d3717587d6c8b02d080cdfb62b36ac495207c61558bb7eee400e185b68cd"], 0x0, 0x57}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000040)={{0x77359400}, 0x1, 0x4, 0x7}, 0x18) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x3, 0x4) 08:29:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f00000002c0)=[r2, r3]) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000100)=0x7) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='seg_\x01\x01\xf04\xb4L\xd1ACK24\x00\x8d\xdf\xbb\xba$\xa4 \xa5A\x02.\aP\xfb\xe6\x87@P\x91\xcdSL\xdd[\xe2V:\xe7~\x92n\xbc\xea#\xb2\xd2\xec]\x84\xae\x0f\"\x90\x9e`,\x9e~g(\xb4\x8f5\x86@+\xb5\a\xb7\xaa\x00ZlV\xd8\f\x15\x88\xfa\xf1j=5\x93\xe6\x16\xee\xb7H\xa8\xea\xbf8\x01|A,G\x89\xa6\xac\x929\xe2\xfa\xc9X;S', 0x0, 0xfda7, 0x3) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x80, 0x4) 08:29:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x0, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:47 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:47 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000540)={0x3, 0x2d, &(0x7f0000000500)="5a4755ed6bac6fcc07168a98f68c3b1a2447ab9a082b16ccdee980e4fab536764d054afe7dd659a904a6cb7f11"}) io_setup(0xaf6, &(0x7f0000000040)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in=@initdev, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r3 = geteuid() setresuid(r3, r2, r3) clock_gettime(0x0, &(0x7f0000000440)) io_getevents(r1, 0x7, 0x3, &(0x7f0000000100)=[{}, {}, {}], &(0x7f00000004c0)={0x77359400}) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f00000005c0)=[0x20, 0x81]) r5 = dup(0xffffffffffffffff) geteuid() syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') fsetxattr$security_smack_entry(r4, &(0x7f0000000480)='security.SMACK64\x00', 0x0, 0x0, 0x0) flock(r4, 0x2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={r6}, &(0x7f0000000700)=0x8) openat(r5, &(0x7f0000000580)='./file0\x00', 0x800, 0x20) setsockopt$inet_tcp_int(r5, 0x6, 0x24, &(0x7f0000000600)=0xffff, 0x4) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) 08:29:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) 08:29:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x440082, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0x5, 0x200, 0x8, 0x7, 0x12, 0x1b, 0x5054, 0x8000, 0xfff, 0x80, 0x7af8, 0x4}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x10800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'syz_tun\x00', 0x4}, 0x18) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x0, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:47 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:47 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x7fffffff, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xfffffffffffffff7, 0x3, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000040)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000180)) 08:29:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000040)={0x6, 0x5}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000100)={0x5b, 0x2926, 0x7fffffff, "a942548d1d69ec1af44fc55eca0eea15f49e73c97092c52dbb6c8da3d96b5b3b7b8506194b77cbd791cf4f0190fecdf1324aa8a4272258f09b8c3615545e2773289192fe32d7692315faa5fb9f8bfb969a13642763640fc96269dd"}) 08:29:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:47 executing program 0: unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000580)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0x0) 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x0, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:47 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000100)={{0x2, 0x7, 0x8, 0xe9ba, 'syz0\x00', 0x101}, 0x1, [0x8000, 0x7, 0x3ff, 0x9, 0x7b, 0x7, 0x6, 0x3, 0x8, 0x7, 0x5, 0x97d3, 0x5, 0x2, 0x7fffffff, 0x9, 0x9, 0x0, 0x0, 0x100, 0x6, 0xffffffff, 0x4, 0x401, 0x6, 0x0, 0x37c1, 0x84b, 0x7, 0xba, 0x9, 0x9, 0x6, 0xb74, 0xfffffffffffffff9, 0x0, 0x1000, 0x7, 0x80, 0xfb, 0x5, 0x6, 0x4, 0x6, 0x1f, 0x1ff, 0x2c35, 0x2, 0x1000, 0xcf6, 0xc98, 0x3, 0xab99, 0x100000001, 0x9, 0x0, 0x2, 0x40, 0xfffffffffffffff7, 0x6, 0x368, 0x81, 0x0, 0x9, 0x81, 0x0, 0x3f, 0x20000000000000, 0x8, 0x0, 0x31, 0x1, 0x3, 0x1a89, 0x1, 0x7, 0x401, 0x12800, 0xb9, 0x5, 0x0, 0xcd1d, 0x80000000, 0x6, 0x1, 0x3, 0x400, 0x5, 0x2, 0x1, 0x7, 0x200, 0x0, 0x1, 0x7f, 0x81, 0x100, 0x162c, 0x3ae33548, 0x1000, 0x4, 0x8, 0x7fff, 0x3, 0x1, 0x5, 0x40, 0x1000, 0x0, 0x1, 0x1ff, 0xff, 0x6, 0x1, 0x1, 0x6, 0x2, 0x5, 0x6, 0x6, 0x40, 0x6, 0x0, 0x8, 0x2a3000000000, 0xea3, 0xfffffffffffffbff, 0x5], {0x77359400}}) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64\x00', 0x0, 0x5577b9b5173d96d5, 0x0) 08:29:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x5) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:47 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:47 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x77a, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2], 0x0, 0x8000000000}) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, 0x0) ioprio_set$pid(0x2, 0x0, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:29:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x0, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x7fff, 0x7fffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 256.779640] *** Guest State *** [ 256.786431] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 256.804595] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 256.829576] CR3 = 0x00000000fffbc000 [ 256.846313] RSP = 0xfffffffffffffff7 RIP = 0x0000000000000000 [ 256.862508] RFLAGS=0x8000000002 DR7 = 0x0000000000000400 08:29:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 256.884764] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 256.897878] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 256.919408] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 08:29:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000040)=0x2) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000100)={'syz1\x00', {0x10000, 0x2, 0x46c, 0x4}, 0x43, [0x0, 0x392, 0x7ff, 0x8, 0x9bc1, 0x1, 0x2, 0x400, 0x4, 0x6, 0x3ff, 0x7fff, 0x9, 0x3, 0xffff, 0x4, 0x362, 0x3, 0x1, 0x100000000, 0x4, 0x6, 0x2400000000000, 0x3, 0x4, 0xd27, 0x2, 0x0, 0x6, 0x4, 0x6, 0x4e117af6, 0xb23, 0xffff, 0x9, 0x3, 0x7ff, 0x4, 0x0, 0x0, 0x9, 0x9, 0x8, 0xdc4, 0x400, 0x9, 0x371e, 0xff, 0x9, 0x81, 0x6, 0x3, 0xb5, 0x7100, 0x5, 0x100000001, 0x0, 0x4, 0x2, 0x0, 0x81, 0xcb, 0xfffffffffffff65b, 0x9160], [0x3, 0x1b6, 0xffffffff80000001, 0x2, 0x6, 0x56d8379, 0x4, 0x520e00ba, 0x0, 0x6, 0x7f, 0xffffffffffffffc0, 0x2, 0x8001, 0x6, 0xffffffffffffffb6, 0x1, 0x1, 0x3f5e, 0x6, 0x1f, 0x177800000000000, 0xffffffffffffffff, 0x45f, 0x41a, 0x101, 0x400000000000, 0x1, 0x10001, 0xffffffffffff8001, 0x4, 0x6, 0x5, 0x8, 0xffff, 0xd6, 0xfffffffffffff800, 0x101, 0x2c6c00000000000, 0x2e, 0x10001, 0x9, 0x80000000, 0x100000000, 0x60000000000000, 0x1, 0x81, 0x8, 0xfff, 0x8, 0x3f, 0x7, 0x4, 0xffff, 0x8001, 0x2, 0xae, 0x7, 0x5, 0x400, 0x4, 0x6, 0x9, 0xff2], [0x80, 0x0, 0x6, 0x0, 0xa7, 0x2, 0x5, 0x5, 0x6, 0x7, 0x40, 0x100000001, 0x3, 0xd60, 0xfffffffff43583da, 0x0, 0x4, 0x80, 0xffffffffffffff7f, 0x100000001, 0x1, 0x3, 0x5, 0x8a6, 0x27d, 0x6, 0x80000000, 0x80000001, 0x2, 0x6, 0x1, 0xa3c, 0xfa55, 0x80000001, 0xffff, 0xaea3, 0x20, 0x73f3, 0x60, 0x7, 0x286, 0x9, 0x0, 0x3ffc00, 0x5b, 0x6, 0x9, 0x4, 0x4, 0x2, 0x3ff, 0x7fffffff, 0x5, 0xfffffffffffffff8, 0xfffffffffffff6bc, 0x100000001, 0x2, 0x5, 0x8, 0x2, 0x8, 0x20, 0x2, 0x5], [0x9, 0x4, 0x0, 0x6, 0x80000000, 0x100, 0x8, 0x2, 0x100, 0x8, 0x4, 0xa7, 0x3f, 0x7fff, 0x2, 0x1, 0x4, 0x7fff, 0x7, 0x2, 0x0, 0x800, 0xffffffffffff8248, 0x7, 0x9, 0xe0000000000000, 0x0, 0x27bc7eb8, 0xf14, 0x100, 0x9, 0x6, 0x6, 0x80000001, 0x8, 0x3, 0x2, 0x101, 0x2, 0xffffffffffffff00, 0x401, 0xffff, 0x0, 0x8, 0x0, 0x4a6d, 0x1ff, 0x200, 0x8001, 0x2, 0x3, 0x1, 0xd7c9, 0x10001, 0x1f, 0x7fffffff, 0x100000000, 0x7ff, 0x3, 0x5, 0x80000000, 0x2, 0x3, 0x6]}, 0x45c) 08:29:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 256.956904] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 08:29:48 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 257.030709] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 08:29:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) [ 257.085546] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 257.103009] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 08:29:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000100)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x40, 0x1ff, 0x9, 0x1, 0x0, 0x6ea, "5bc32942c53672cbaf62ba8d3f115aef78cfb2fc557e0fb251cb8c4530fb9ca2028b88616edf70fd0b3658b98a771b0aca96a7cd61152ab029c612c6c290f6cc"}, 0x158) fchmod(r1, 0xe0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000440), 0x4) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0xfe, "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"}, &(0x7f0000000080)=0x106) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000003c0)={r2, 0x101, 0x0, 0x5, 0x35aa, 0x85}, 0x14) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000400)) [ 257.167838] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 257.217940] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 257.226624] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 257.235533] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 257.235588] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 257.235621] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 257.235663] Interruptibility = 00000000 ActivityState = 00000000 [ 257.235687] *** Host State *** [ 257.235731] RIP = 0xffffffff81173b9f RSP = 0xffff88808a58f998 [ 257.235801] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 257.235830] FSBase=00007f46a5d2b700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 257.235931] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 257.235981] CR0=0000000080050033 CR3=0000000057840000 CR4=00000000001426f0 [ 257.251922] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018f0 [ 257.265177] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 257.274745] *** Control State *** [ 257.289015] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 257.307142] EntryControls=0000d1ff ExitControls=002fefff [ 257.337456] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 257.345073] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 257.357005] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 257.366107] reason=80000021 qualification=0000000000000000 [ 257.373123] IDTVectoring: info=00000000 errcode=00000000 [ 257.379625] TSC Offset = 0xffffff735f3dec9f [ 257.389257] EPT pointer = 0x000000005948601e [ 257.394045] Virtual processor ID = 0x0001 08:29:48 executing program 0: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000000c0)) openat$cgroup(r1, 0x0, 0x200002, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000280)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x1, 0x0, 0x0, 0x40800}, 0x4) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x18, 0x10, &(0x7f0000000200), &(0x7f0000000240)}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000001c0)) ioctl$TCSETA(r1, 0x5406, &(0x7f00000002c0)={0x8, 0xffffffffffffff7f, 0x800, 0x8, 0x12, 0x8001, 0x9, 0xffffffffffffff81, 0x0, 0x1000}) 08:29:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:48 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x3, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x21, 0x0, 0x9c) 08:29:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)={0x10000, 0x6}) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:49 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@rc, &(0x7f0000000000)=0x80, 0x800) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x208, 0x70bd26, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004810}, 0x40801) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f0000000280)=ANY=[@ANYBLOB="050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c7700"/88]) fsetxattr$security_smack_entry(r2, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 257.844086] QAT: Invalid ioctl [ 257.848397] QAT: Invalid ioctl 08:29:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:49 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x9, 0x0, 0x9c) 08:29:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x0, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040), 0x4) 08:29:49 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000380)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:29:49 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002540)='/dev/mixer\x00', 0x807fe, 0x0) recvfrom$inet(r1, &(0x7f0000002580)=""/164, 0xa4, 0x1, &(0x7f0000002640)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:49 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x3, 0x0, 0x4) [ 258.487354] Unrecognized hibernate image header format! [ 258.512966] PM: Image mismatch: architecture specific data 08:29:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x0, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:49 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') [ 258.671271] Unrecognized hibernate image header format! [ 258.676694] PM: Image mismatch: architecture specific data 08:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x8, 0x0, 0x9c) 08:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x80, 0x4) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockname$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x10) 08:29:50 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x0, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:50 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:50 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x6e, 0x0, 0x9c) 08:29:50 executing program 4: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:50 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) 08:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2000000, 0x0, @empty}}}, 0x30) 08:29:50 executing program 0: 08:29:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000100)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x25}, 0x4e22, 0x4, 0x4e23, 0x1, 0xa, 0x0, 0x20, 0x4, 0x0, r2}, {0x4, 0xfff, 0x5, 0x20, 0x4, 0x6, 0x3, 0xfff}, {0x1, 0x3, 0x8, 0x8000}, 0x7, 0x6e6bb6, 0x2, 0x4b98cd9963f20b3b, 0x2, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d6, 0xff}, 0x0, @in6=@mcast2, 0x0, 0x7, 0x2, 0xff, 0x8, 0x101, 0x200}}, 0xe8) 08:29:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) 08:29:50 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x0, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) epoll_wait(r0, &(0x7f0000000040)=[{}], 0x1, 0x17) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:50 executing program 0: 08:29:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) 08:29:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r0, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:50 executing program 0: 08:29:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8081, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="80000e00fffffaff04000000c88a7d0c17024007000100027e495f6f4853a18476137e97db4da1e198f1894c8d7b55ddd494f4f5eff283"], &(0x7f0000000140)=0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000180)={r2, 0x0, 0x7f, 0x1, 0x5, 0x7}, 0x14) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x38a, 0x0) 08:29:50 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./bus\x00') 08:29:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x0, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:51 executing program 0: 08:29:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000100)=0xfffffffffffffde9) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./bus\x00') 08:29:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, 0x0, 0x0) 08:29:51 executing program 0: 08:29:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000240)={0x73622a85, 0x10ff, 0x3}) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0xc1, 0x0) io_setup(0x6581af12, &(0x7f0000000040)=0x0) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xf, 0x2, r1, &(0x7f0000000100)="51b0d6cede6765c9c260a1d38bd84805026561b15102ce47b463574ef95bf090ad2c70aec8635322fb1d86727b88365dac3ea37f31f733d94c13548309cfc25abc1efe67dae16930f4e3d1bcd878f703ab81a313dcd5a5495cba56f0e3f0c0970e91826220027db0639b433c54d82618de8d00a87f44f1398151a7f0f818905ebc7815cc1e984501d1bae8e902894920364388fac7cf48b438660658ceb651692c891aa26d0573813b9060438936073d93f17f7be264fb67807fb9299677dd18717856aaca3d9a", 0xc7, 0x19, 0x0, 0x2, r1}, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, r3, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000044}, 0x4000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x9, 0x4, 0x2, 0xffffffff}) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x0, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 0: 08:29:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}}}, 0x30) 08:29:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x7ff, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 0: 08:29:51 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./bus\x00') 08:29:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:51 executing program 0: 08:29:51 executing program 1: dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}}}, 0x30) 08:29:51 executing program 0: 08:29:51 executing program 1: timer_create(0x7, &(0x7f0000000040)={0x0, 0x4, 0x1}, &(0x7f0000000080)=0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) read(r1, &(0x7f00000002c0)=""/208, 0xd0) timer_settime(r0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) inotify_init1(0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timer_settime(r0, 0x0, &(0x7f0000000180)={{r2, r3+30000000}, {0x77359400}}, &(0x7f00000001c0)) 08:29:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:51 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:52 executing program 0: 08:29:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x800, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x101000, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setrlimit(0xf, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}}}, 0x30) 08:29:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:52 executing program 0: 08:29:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000040)={0x7, 0x6, 0xc91, 0x4, 0x1, 0xfff}) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:52 executing program 0: 08:29:52 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:52 executing program 0: 08:29:52 executing program 5: 08:29:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7ff}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2e8fe159, 0x3}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$admmidi(0x0, 0x1, 0x100) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$alg(0x26, 0x5, 0x0) close(r5) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) get_robust_list(r6, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 08:29:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:52 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:52 executing program 0: 08:29:52 executing program 5: 08:29:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:52 executing program 5: 08:29:52 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:52 executing program 0: 08:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:53 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = accept$packet(r0, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000180)={0x2000003e, 0x1, 0x32}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='gre0\x00') accept$inet6(r0, 0x0, &(0x7f0000000140)) getpeername(r0, &(0x7f0000000040)=@ax25={{}, [@null, @bcast, @null, @null, @rose, @bcast, @remote, @netrom]}, &(0x7f0000000100)=0x80) 08:29:53 executing program 5: 08:29:53 executing program 0: 08:29:53 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)) r1 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r2, &(0x7f0000000600)='./bus\x00') 08:29:53 executing program 0: 08:29:53 executing program 1: lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00') r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x3, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:53 executing program 5: 08:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:53 executing program 0: 08:29:53 executing program 5: 08:29:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='secu\x87ity.SMACK64\x00\xd5W\xb5\xc5\xd6\xb7\xcc\xf8w\xb06\xa7\x1b\r\x01\xe5s\xca\x84\xd3k\n\b\x00\x00\x00\xbe`\xfa\xeb\xc11\xbe\xe53t3\xdfN\xf4z\xd9%y\x91\xf6!\xef\\\xd8\xcd\xfb\n\x13\x16\xa8\x11\xe4\xcb\x94|\xa7\x03\xcc\xc9\xa5\xa0\x8b\xf3M\x92\x88*5\xa6\x1e\x15\xd8\x8e`', 0x0, 0x0, 0x0) 08:29:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:53 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)) r1 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r2, &(0x7f0000000600)='./bus\x00') 08:29:53 executing program 5: 08:29:53 executing program 0: 08:29:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x5be, 0x400000) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000100)) 08:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:53 executing program 5: 08:29:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000100)={0xa, 0x4, {0x20000000000054, 0x1e, 0x6b6e, {0xffffffffffffffb4, 0x1}, {0x0, 0x6}, @rumble={0xffff}}, {0x53, 0x5, 0xc, {0x2, 0x7}, {0xfff, 0x8}, @ramp={0x1f, 0x7ff, {0xfffffffffffffffa, 0x79, 0xa56}}}}) flistxattr(r0, &(0x7f0000000180)=""/215, 0xd7) 08:29:53 executing program 5: 08:29:53 executing program 0: 08:29:53 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)) open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r1, &(0x7f0000000600)='./bus\x00') 08:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:53 executing program 5: 08:29:53 executing program 0: 08:29:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x8, 0x8000, 0x1, 0x7ff, 0x40, 0x1000, 0x5, r2}, &(0x7f00000001c0)=0x20) fsetxattr$security_smack_entry(r1, &(0x7f0000000200)='security.SMACK64MMAP\x00', 0x0, 0xfffffea5, 0x0) 08:29:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:53 executing program 5: 08:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)) open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r1, &(0x7f0000000600)='./bus\x00') 08:29:54 executing program 0: 08:29:54 executing program 5: 08:29:54 executing program 1: r0 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x40, 0x4) 08:29:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 0: 08:29:54 executing program 5: 08:29:54 executing program 0: r0 = memfd_create(&(0x7f0000000040)=' ', 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', 0x0, 0xfffffffffffffcab) 08:29:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) recvfrom$unix(r1, &(0x7f0000000200)=""/204, 0xcc, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x81, @rand_addr="e85ca56eb38a0cbec35bc8f7d8c06224", 0x6}}, 0x40, 0x2}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={r2, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={r3, 0xffffffff80000000}, &(0x7f0000000340)=0x8) 08:29:54 executing program 5: 08:29:54 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000400)) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r1, &(0x7f0000000600)='./bus\x00') 08:29:54 executing program 0: 08:29:54 executing program 5: 08:29:54 executing program 5: 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:54 executing program 0: 08:29:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:54 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:54 executing program 5: 08:29:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000040)={0x0, 0x989680}, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x1ff) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x400000000000000}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x15) 08:29:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) r3 = getuid() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x8000, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}, {@debug={'debug', 0x3d, 0x3}}, {@privport='privport'}, {@posixacl='posixacl'}, {@access_any='access=any'}, {@access_client='access=client'}], [{@obj_type={'obj_type', 0x3d, 'security.SMACK64\x00'}}, {@uid_gt={'uid>', r2}}, {@pcr={'pcr', 0x3d, 0x3d}}, {@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'proc:wlan1\'&md5sum'}}, {@euid_eq={'euid', 0x3d, r3}}, {@dont_appraise='dont_appraise'}]}}) 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 1: gettid() r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) setsockopt$rose(r0, 0x104, 0x6, &(0x7f00000001c0)=0x485fa1e5, 0x4) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0x3ff8000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = dup(r1) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x3f, 0xfffffffffffffffa}, 'port1\x00', 0x10, 0x42, 0x41ac, 0x6, 0x40, 0x0, 0x7, 0x0, 0x7, 0x7}) 08:29:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:54 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:54 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) fallocate(r2, 0x0, 0x410001, 0x1) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffe) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") 08:29:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:55 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101080, 0x17b) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f0000000100)=0x4) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:55 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:55 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fdatasync(r0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 264.375734] audit: type=1804 audit(1562056195.642:89): pid=11755 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir951003261/syzkaller.U6u44h/225/bus" dev="sda1" ino=17132 res=1 [ 264.459502] audit: type=1804 audit(1562056195.722:90): pid=11756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir951003261/syzkaller.U6u44h/225/bus" dev="sda1" ino=17132 res=1 08:29:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 08:29:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c00700ca0000000000e270") mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x9) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$P9_RLERROR(r1, &(0x7f0000000040)={0x9, 0x7, 0x1}, 0x9) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{0x0, 0x2710}}) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) 08:29:55 executing program 5: ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x2, @empty}}, 0x1e) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ftruncate(r0, 0x9) 08:29:56 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:56 executing program 5: ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0xfffffe81, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f0000000080)={{0xa, 0x1, 0x9, 0x1000, 'syz1\x00', 0x1}, 0x1, [0x0, 0xc, 0x7fffffff, 0x10, 0x3, 0x8001, 0x5, 0x7f, 0x3, 0x2, 0x4, 0x400, 0x1, 0xfffffffffffffffe, 0x9, 0xeb00, 0x5, 0x5e, 0x80, 0x6, 0x4, 0x7fffffff, 0x6, 0x503, 0x40, 0xffffffffffff0000, 0x1, 0xfffffffffffffffc, 0x8, 0xc2, 0x8000, 0x1, 0x3203, 0xa2f1, 0x1, 0x80000001, 0x0, 0x0, 0x6, 0x3, 0x4, 0x9, 0x21ff, 0x8000, 0x8, 0x0, 0x4, 0xffffffffffff7fff, 0xc3a6, 0x0, 0x4, 0xfffffffffffffffd, 0x101, 0x9, 0xfd, 0x6, 0x9, 0x400, 0x9, 0x2, 0x5dd8, 0x7f, 0x1, 0x483, 0x400, 0xfcb, 0x47, 0xfff, 0x5, 0xffffffffffffff2c, 0x0, 0x9, 0x7ff, 0x7, 0x400, 0x8, 0x80000001, 0x2, 0x5, 0x0, 0x800f, 0x6, 0x4094, 0x1000, 0x8d, 0x400, 0x4, 0x6, 0x200, 0x3, 0x7, 0x7, 0x7fffffff, 0xecc8, 0x100000001, 0x0, 0xca1, 0x1, 0x6, 0xffffffff, 0x8, 0x101, 0x2, 0x1, 0x2, 0x200, 0x6, 0x9, 0x7, 0x1f, 0x6, 0x4, 0x2, 0x3, 0xd7, 0x51, 0x0, 0x2, 0x8, 0x9, 0x4, 0x3, 0x2, 0x2c, 0x7, 0x40, 0xfff]}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x200040}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x78, r3, 0x108, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc807}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000580)='memory.swap.current\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r4, 0x40045532, &(0x7f00000005c0)=0x15) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000600)={r0}) bind$bt_l2cap(r2, &(0x7f00000008c0)={0x1f, 0x566, {0x2, 0x3, 0x4, 0x9, 0x1f, 0x7}, 0x1, 0x6}, 0xe) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000680)={r4, r2, 0x0, 0x19, &(0x7f0000000640)="b464996078e4001d0fb39fe5717c70b9b7a20006e4422e60f2", 0x1f, 0x400, 0x5, 0x9, 0x3, 0x3, 0x7, 'syz0\x00'}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) 08:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:56 executing program 5: ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 08:29:56 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = dup(r1) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64\x00', 0x0, 0x116, 0x80001) 08:29:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 08:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:56 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') [ 265.138228] Unknown ioctl 44698 [ 265.156709] Unknown ioctl 44698 08:29:56 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) socket$pptp(0x18, 0x1, 0x2) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x3) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x20000000001) 08:29:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 08:29:56 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:56 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:56 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:56 executing program 5: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 5: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000080)=0x5ee) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffffaea2c60d, 0x40000) ioctl$KIOCSOUND(r1, 0x4b2f, 0x3) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:57 executing program 5: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, &(0x7f0000003600)) 08:29:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4002, 0x110) ioctl$FICLONE(r1, 0x40049409, r0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000080)={0x0, 0x5a, 0x3006, 0x1}) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:57 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) 08:29:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) 08:29:57 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) 08:29:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0xfffffffd) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x201, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:57 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, 0x0) 08:29:57 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:57 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) dup(0xffffffffffffffff) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x400, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:57 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7ff}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2e8fe159, 0x3}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$admmidi(0x0, 0x1, 0x100) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$alg(0x26, 0x5, 0x0) close(r5) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) get_robust_list(r6, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 08:29:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7ff}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2e8fe159, 0x3}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$admmidi(0x0, 0x1, 0x100) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$alg(0x26, 0x5, 0x0) close(r5) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) get_robust_list(r6, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 08:29:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x0, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34a2bb74a0") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040)=0x4, 0x8) 08:29:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/uinput\x00', 0x802, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x6, 0x7, 0x0, 0x9}, 0x2f, [0x2, 0x8, 0x2, 0x1, 0x1, 0x7fffffff, 0x0, 0x47, 0x3, 0x8000, 0x3, 0x100000000, 0x800000000000, 0x61, 0x4f, 0x8, 0x81, 0xcf4, 0x8001, 0x4, 0xf16, 0x10000, 0x0, 0x6, 0x8, 0x9, 0x2, 0xffff, 0x3, 0x8001, 0x80, 0x100000001, 0x0, 0x800, 0xb2, 0x1000, 0xffffffffffff0001, 0x3ff, 0x9, 0x5, 0x5, 0xffff, 0x7, 0x401, 0x6, 0x2, 0x6, 0x5, 0xfffffffffffffff8, 0x2, 0x4, 0x7d2, 0x3f, 0xc70, 0x2, 0x40, 0x1, 0xf7f1, 0x3, 0x2, 0xc9f9, 0xffffffff, 0x100, 0x7], [0x2, 0xf6a5, 0x7fff, 0x1534bc28, 0x5, 0x6, 0xff, 0x1f, 0xfffffffffffffff8, 0x3ff, 0x6, 0x40, 0x7, 0x4, 0x2, 0x401, 0x479, 0x8001, 0x1f, 0x8, 0x4, 0x7, 0x4, 0x3, 0x1f, 0x8, 0xde78, 0x2, 0x5, 0x5, 0x8, 0x238f, 0x75, 0x91a, 0x1, 0xfff, 0x20000, 0x0, 0x5, 0x7d, 0x2, 0x1, 0x0, 0xffff000000000, 0xf0, 0x5, 0x1, 0x8cbc, 0x7, 0x5, 0x5, 0x2, 0x8000, 0x80000000, 0x0, 0x476, 0x7, 0x8, 0x4, 0x3, 0x7, 0xba, 0x5], [0x5, 0x7f, 0x401, 0x80000001, 0x1854, 0x7f, 0x0, 0x9, 0x8, 0x1f, 0x7, 0xffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x10001, 0x2, 0x2, 0x8001, 0x3, 0xa3be, 0x3, 0x8, 0x4, 0xffffffff, 0xfff, 0x80000000, 0x2, 0x3, 0x5, 0x1, 0x33, 0x2fd8, 0x101, 0x80, 0x8, 0xc97b, 0x1, 0x20, 0x2, 0x14136981, 0x80000000, 0x4b, 0x4, 0x8000, 0x6, 0x5, 0x5, 0xdd44, 0x10000, 0x2, 0x9, 0x7ff, 0x6042, 0x720, 0x81, 0x2, 0x81, 0x3f, 0x7fffffff, 0xffffffffffffff42, 0x54e, 0x1f, 0x100000001], [0x10000, 0x1, 0x35, 0x8, 0x3, 0xa4, 0x3, 0x9, 0x1, 0x401, 0xb6c0, 0x6, 0x8, 0x3ff, 0x3ff, 0x2, 0x7279ca40, 0x9, 0xfffffffffffffff7, 0x3ff, 0x1, 0x6a9, 0x5, 0x80000001, 0x1, 0x80000001, 0x0, 0x6, 0x0, 0x6, 0x2, 0x7, 0xbcf, 0x401, 0x1000, 0x100000000, 0x101, 0x1000, 0x2, 0x40, 0x0, 0x100000001, 0x1ff, 0x0, 0x4, 0x0, 0x7, 0x0, 0x7fffffff, 0x2, 0x1, 0xaa31, 0x401, 0x3, 0xffffffff7fffffff, 0x0, 0xd6, 0x8, 0x40, 0x2, 0x1000, 0x5, 0xffff, 0x5]}, 0x45c) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x3, 0x4}}, 0x10) 08:29:58 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 2: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') 08:29:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7ff}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2e8fe159, 0x3}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$admmidi(0x0, 0x1, 0x100) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$alg(0x26, 0x5, 0x0) close(r5) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) get_robust_list(r6, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 08:29:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) write$uinput_user_dev(r1, &(0x7f0000000100)={'syz0\x00', {0x6, 0x4, 0xfffffffffffffc00, 0x3}, 0x39, [0x30000, 0x1, 0x8, 0x0, 0x1, 0xf3, 0x7fffffff, 0x3, 0x0, 0x3, 0x43, 0x5, 0xd2, 0x8, 0x7, 0x0, 0x80000001, 0x4, 0x6, 0x96, 0xffffffff80000000, 0xc1a, 0x9, 0x4, 0x7, 0x0, 0x1000, 0x3, 0xa0, 0x3, 0xbd, 0x90, 0x1, 0x4, 0xffffffffffffe591, 0xea, 0x7fff, 0x6, 0x8, 0x80000001, 0x6, 0x3, 0x77b9, 0x2, 0xa6c, 0x2, 0x0, 0xfff, 0x9, 0x96, 0x4, 0x40, 0x6bc, 0x1, 0x10001, 0x4, 0x3, 0x1, 0x100, 0x6, 0x7, 0xcac, 0x1, 0x7], [0x20, 0x4, 0x5, 0x3ff, 0x66, 0x5a0, 0x8, 0x9, 0x80000000, 0x0, 0x3, 0x785, 0x1, 0x1, 0x10000, 0x3, 0xffffffffffffffff, 0xfec3, 0x527c, 0x8, 0x40, 0x7, 0x7fff, 0x7, 0x40, 0x6, 0x101, 0x9, 0x0, 0xd050, 0x1ff, 0x10000, 0x40, 0x2361, 0x2, 0xffff, 0x344361c2, 0x1, 0x6000000000000000, 0x6, 0x1000, 0x6346, 0x2, 0x4, 0xffff, 0x2, 0x1, 0x7, 0x8, 0x7ff, 0xb71, 0x80, 0x8, 0x3, 0x81, 0x7, 0xfff, 0x1, 0x0, 0x10000, 0x9, 0x10000, 0x100000000, 0x2], [0x6, 0x4, 0x6, 0x40000, 0x2, 0x9139, 0x7, 0xffffffffffffffff, 0x4, 0x3, 0x100000001, 0x3, 0x6, 0x7, 0x9, 0x8000, 0x8000, 0x4, 0x153a, 0x9, 0x2b99, 0x6, 0x0, 0x7, 0x3, 0x7, 0x0, 0x80000001, 0x1, 0x6, 0x72, 0x20, 0x400, 0x2, 0x3ff, 0x1, 0x5cf1, 0x9, 0x5, 0x101, 0x9, 0x7b, 0x2, 0xb2c9, 0x7fffffff, 0x400, 0x7fff, 0x4, 0x1ff, 0x6, 0x5, 0x100, 0x2, 0x0, 0x5, 0x3ff, 0x4dd9, 0x1, 0x400, 0xe56, 0x400, 0x10000, 0x0, 0x5], [0x3, 0x79c2, 0x70c, 0x4, 0xf847, 0x3, 0x1ff, 0x2, 0x5, 0x7f, 0x101, 0x3, 0x2, 0x200, 0x2, 0xffffffffffff3330, 0x1, 0x5, 0x98000000000000, 0x9, 0x8, 0xfffffffffffffed1, 0x7fffffff, 0x401, 0x0, 0xffffffffffffff1a, 0x0, 0x3, 0x0, 0xba1, 0x0, 0xff, 0xfffffffffffffffa, 0x8, 0x1f, 0x98d, 0x256, 0x8, 0x7, 0x0, 0x0, 0x6, 0x0, 0x69, 0x6, 0x0, 0x1c, 0x8, 0x1, 0x96, 0x2, 0x7fff, 0xfff, 0x2, 0x1, 0x5, 0xd8f, 0x0, 0x200, 0x9, 0x7, 0x6, 0x9, 0x10001]}, 0x45c) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:58 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) 08:29:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:58 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:59 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bind$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x7ff}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1, 0x2e8fe159, 0x3}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$admmidi(0x0, 0x1, 0x100) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socket$alg(0x26, 0x5, 0x0) close(r5) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) get_robust_list(r6, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000180)={&(0x7f0000000140)}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f00000002c0)=0x18) 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:59 executing program 1: socket$netlink(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) socketpair(0x7, 0x80000, 0x6, &(0x7f0000000540)={0xffffffffffffffff}) r1 = accept(r0, &(0x7f00000004c0)=@ll, &(0x7f0000000400)=0x218) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, r2, 0x9, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x833}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20040000}, 0x48000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r2, 0x2, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8a52}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20004001) dup(r3) fsetxattr$security_smack_entry(r3, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x0, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:59 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:29:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:59 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0xd6, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000100)=""/214}, &(0x7f0000000080)=0x78) ftruncate(r0, 0xffff) 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) fcntl$setown(r0, 0x8, r1) dup(r0) r2 = dup(0xffffffffffffffff) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x1a6, 0x0) 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:29:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:29:59 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:30:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x0, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) accept4$x25(r1, &(0x7f0000000140), &(0x7f0000000180)=0x12, 0x800) bind$ax25(r1, &(0x7f0000000040)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000100)=0x8) 08:30:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x0, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:00 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:30:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:30:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) 08:30:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x0, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:30:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x0, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="02000000", @ANYRES16=r2, @ANYBLOB="00022cbd7000fcdbdf250700000008000500dc000000080004000101000008000400ffffffff64000300140002006263736830000000000000000000000014000600ff0100000000000000000000000000010800040020000000080001000200000008000500ac1e000108000400010000000800080001000000080007004e2100000800010003000000080005000100000008000500200000000c000100080004004e210000"], 0xac}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) 08:30:00 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000400)) r2 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000640), 0x0) bind$unix(r2, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) write$tun(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="87c1ba1ceda4fba1f9ad75"], 0x1) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1000000048100, 0x0) pwritev(r0, &(0x7f0000002880)=[{0x0}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r3, &(0x7f0000000600)='./bus\x00') vmsplice(r0, &(0x7f0000000400)=[{0x0}, {0x0}], 0x2, 0x4) 08:30:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:30:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000100)='se\xb1urfty\x04\x06\x7f\'\xce\xca.SM\x1d\x8c\x90\x85\xb5\xca\xef\xf8;\x17\xe0\a\xb5i[\xad\xf0R\x84Q\x8e\xa0\x1b\xf9a\x85\x8d\x02\xd5\xd5\xe2\xd2\xbeN\xcf%*\x9bR\x19z\xea', 0x0, 0x461, 0xfffffffffffffffe) 08:30:00 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:30:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 08:30:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, 0x0) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x1, 0x0) dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='se\aurity.SMACK64\x00', 0x0, 0x0, 0x0) 08:30:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 270.061594] FAT-fs (loop3): bogus number of reserved sectors 08:30:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x3) geteuid() r1 = dup(r0) read(r1, &(0x7f00000000c0)=""/10, 0xa) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64\x00', 0x0, 0x2e6, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000040)={0xa52, 0x20, [0x200, 0x81, 0x8, 0x7, 0x3, 0x5, 0xffffffffffffffff, 0x2]}) 08:30:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 270.107877] FAT-fs (loop3): Can't find a valid FAT filesystem 08:30:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:01 executing program 3: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) symlinkat(&(0x7f00000005c0)='./file0\x00', r0, &(0x7f0000000600)='./bus\x00') 08:30:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(r0, 0x402c542b, 0x0) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) 08:30:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = dup(0xffffffffffffffff) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000002) 08:30:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x74) write$vhci(r0, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x81}, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f00000000c0)={0x3, 0x9, 0x2, 0x9, 0x400, "6c7dbeb8a64dc753c572c06bbc308fa867a004", 0x1f, 0x80}) keyctl$clear(0x7, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) llistxattr(0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000480), 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, &(0x7f0000000080)) [ 270.291341] kasan: CONFIG_KASAN_INLINE enabled [ 270.296741] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 270.313870] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 270.320148] Modules linked in: [ 270.323352] CPU: 1 PID: 12188 Comm: blkid Not tainted 4.14.131 #25 [ 270.329689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.339262] task: ffff8880825ce640 task.stack: ffff88805ab78000 [ 270.345401] RIP: 0010:kobject_uevent_env+0xa1/0xc23 [ 270.350408] RSP: 0018:ffff88805ab7fb60 EFLAGS: 00010286 [ 270.356256] RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 1ffff110104b9dd6 [ 270.363650] RDX: 0000000000000014 RSI: 0000000000000002 RDI: ffffffff870758b0 [ 270.370907] RBP: ffff88805ab7fbe0 R08: ffff8880825ce640 R09: 0000000000000003 [ 270.378180] R10: 0000000000000000 R11: ffff8880825ce640 R12: 00000000000000a0 [ 270.385470] R13: 0000000000000002 R14: ffff88809a120180 R15: 00000000000000a0 [ 270.392729] FS: 00007f74c08f9740(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 270.400951] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.406949] CR2: 000000c4313bd000 CR3: 000000008d9bd000 CR4: 00000000001406e0 [ 270.414225] Call Trace: [ 270.416819] ? lock_downgrade+0x6e0/0x6e0 [ 270.420982] kobject_uevent+0x20/0x26 [ 270.425187] loop_clr_fd+0x4a7/0xae0 [ 270.428891] lo_release+0x112/0x1b0 [ 270.432503] ? loop_clr_fd+0xae0/0xae0 [ 270.436388] __blkdev_put+0x434/0x7f0 [ 270.440200] ? bd_set_size+0xb0/0xb0 [ 270.444095] ? wait_for_completion+0x420/0x420 [ 270.448686] blkdev_put+0x88/0x510 [ 270.452242] ? fcntl_setlk+0xb90/0xb90 [ 270.456133] ? blkdev_put+0x510/0x510 [ 270.459938] blkdev_close+0x8b/0xb0 [ 270.463649] __fput+0x275/0x7a0 [ 270.466910] ____fput+0x16/0x20 [ 270.470185] task_work_run+0x114/0x190 [ 270.474425] exit_to_usermode_loop+0x1da/0x220 [ 270.479283] do_syscall_64+0x4bc/0x640 [ 270.483161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.488015] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.501528] RIP: 0033:0x7f74c02012b0 [ 270.505248] RSP: 002b:00007ffe70a388b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 270.513271] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f74c02012b0 [ 270.520531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 270.527789] RBP: 0000000000000000 R08: 0000000000000028 R09: 0000000001680000 [ 270.535049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001411030 08:30:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="e3575886c6063b57316cc5de54797b6f4d016aa37ba82a70363b6e807d8213f0beb221d078fb2fa706003b7f8ec4c3fbc92df8cccbb4ed44dcf3309ed5a8df3e7e036fcf34") r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000001c0)={0x2710, 0x0, 0x101000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) fstatfs(r1, &(0x7f0000000180)=""/31) socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) fchdir(r1) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='bond_slave_1\x00', 0x10) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r6, 0x10099b7) sendfile(r5, r6, 0x0, 0xfffffffd) connect$unix(r5, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 270.542308] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 270.549569] Code: fa 83 e2 07 38 d0 7f 09 84 c0 74 05 e8 0f 9b 70 fb 41 80 4f 3c 08 e8 15 f9 46 fb 4c 89 fa b8 ff ff 37 00 48 c1 ea 03 48 c1 e0 2a <80> 3c 02 00 74 08 4c 89 ff e8 a7 9a 70 fb 49 8b 37 48 c7 c1 a0 [ 270.569310] RIP: kobject_uevent_env+0xa1/0xc23 RSP: ffff88805ab7fb60 [ 270.578820] ---[ end trace 4576326d2b521646 ]--- [ 270.583769] Kernel panic - not syncing: Fatal exception [ 270.592212] Kernel Offset: disabled [ 270.596211] Rebooting in 86400 seconds..