49m8[?25h[?0c[ 34.714543] audit: type=1800 audit(1585341983.905:33): pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 . [ 34.743963] audit: type=1800 audit(1585341983.905:34): pid=7177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.018505] random: sshd: uninitialized urandom read (32 bytes read) [ 37.241313] audit: type=1400 audit(1585341986.435:35): avc: denied { map } for pid=7352 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 37.292736] random: sshd: uninitialized urandom read (32 bytes read) [ 38.095943] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.69' (ECDSA) to the list of known hosts. [ 43.849700] random: sshd: uninitialized urandom read (32 bytes read) 2020/03/27 20:46:33 fuzzer started [ 44.081826] audit: type=1400 audit(1585341993.275:36): avc: denied { map } for pid=7361 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.673081] random: cc1: uninitialized urandom read (8 bytes read) 2020/03/27 20:46:34 dialing manager at 10.128.0.105:42679 2020/03/27 20:46:34 syscalls: 2937 2020/03/27 20:46:34 code coverage: enabled 2020/03/27 20:46:34 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/03/27 20:46:34 extra coverage: extra coverage is not supported by the kernel 2020/03/27 20:46:34 setuid sandbox: enabled 2020/03/27 20:46:34 namespace sandbox: enabled 2020/03/27 20:46:34 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/27 20:46:34 fault injection: enabled 2020/03/27 20:46:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/27 20:46:34 net packet injection: enabled 2020/03/27 20:46:34 net device setup: enabled 2020/03/27 20:46:34 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/27 20:46:34 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 46.935545] random: crng init done 20:48:50 executing program 5: 20:48:50 executing program 0: 20:48:50 executing program 3: 20:48:50 executing program 1: 20:48:50 executing program 4: 20:48:50 executing program 2: [ 181.504644] audit: type=1400 audit(1585342130.695:37): avc: denied { map } for pid=7361 comm="syz-fuzzer" path="/root/syzkaller-shm320647508" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 181.554673] audit: type=1400 audit(1585342130.725:38): avc: denied { map } for pid=7381 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15711 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 181.871063] IPVS: ftp: loaded support on port[0] = 21 [ 182.633735] IPVS: ftp: loaded support on port[0] = 21 [ 182.694231] chnl_net:caif_netlink_parms(): no params data found [ 182.752064] IPVS: ftp: loaded support on port[0] = 21 [ 182.798261] chnl_net:caif_netlink_parms(): no params data found [ 182.867370] IPVS: ftp: loaded support on port[0] = 21 [ 182.891995] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.899009] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.906560] device bridge_slave_0 entered promiscuous mode [ 182.918881] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.925495] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.932659] device bridge_slave_1 entered promiscuous mode [ 182.990639] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.013906] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.020395] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.028378] device bridge_slave_0 entered promiscuous mode [ 183.036603] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.059201] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.065730] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.072881] device bridge_slave_1 entered promiscuous mode [ 183.091868] chnl_net:caif_netlink_parms(): no params data found [ 183.109150] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.117444] team0: Port device team_slave_0 added [ 183.138165] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.145757] team0: Port device team_slave_1 added [ 183.152799] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.164290] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.195801] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.204070] IPVS: ftp: loaded support on port[0] = 21 [ 183.210136] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.237195] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.254845] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.261394] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.287325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.304802] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.313675] team0: Port device team_slave_0 added [ 183.319123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.329725] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.338882] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.347132] team0: Port device team_slave_1 added [ 183.433715] device hsr_slave_0 entered promiscuous mode [ 183.470453] device hsr_slave_1 entered promiscuous mode [ 183.531989] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.542472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 183.548759] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.574239] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 183.591551] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.597986] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.605210] device bridge_slave_0 entered promiscuous mode [ 183.614736] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.621927] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.628990] device bridge_slave_1 entered promiscuous mode [ 183.635868] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.653003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 183.659274] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 183.685545] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 183.738835] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.754294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 183.773963] IPVS: ftp: loaded support on port[0] = 21 [ 183.792633] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.808618] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 183.883473] device hsr_slave_0 entered promiscuous mode [ 183.930359] device hsr_slave_1 entered promiscuous mode [ 184.003413] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 184.019868] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.027207] team0: Port device team_slave_0 added [ 184.038153] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 184.045753] team0: Port device team_slave_1 added [ 184.054986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.062141] chnl_net:caif_netlink_parms(): no params data found [ 184.119383] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.126796] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.152785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.166945] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.173385] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.198746] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.253001] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 184.285285] chnl_net:caif_netlink_parms(): no params data found [ 184.301837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 184.394327] device hsr_slave_0 entered promiscuous mode [ 184.460349] device hsr_slave_1 entered promiscuous mode [ 184.541037] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 184.548318] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 184.578561] audit: type=1400 audit(1585342133.765:39): avc: denied { create } for pid=7386 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 184.621299] audit: type=1400 audit(1585342133.795:40): avc: denied { write } for pid=7386 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 184.645880] audit: type=1400 audit(1585342133.805:41): avc: denied { read } for pid=7386 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 184.653494] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.676941] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.684055] device bridge_slave_0 entered promiscuous mode [ 184.701846] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.708216] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.715889] device bridge_slave_1 entered promiscuous mode [ 184.820900] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 184.833571] chnl_net:caif_netlink_parms(): no params data found [ 184.847052] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.859602] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 184.928179] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 184.935657] team0: Port device team_slave_0 added [ 184.949421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 184.982321] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.989029] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.996350] device bridge_slave_0 entered promiscuous mode [ 185.003397] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.011186] team0: Port device team_slave_1 added [ 185.032538] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.039049] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.046866] device bridge_slave_1 entered promiscuous mode [ 185.063786] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.070934] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.099602] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.112752] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.119119] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.145743] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.158358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.166734] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.204470] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.262716] device hsr_slave_0 entered promiscuous mode [ 185.320364] device hsr_slave_1 entered promiscuous mode [ 185.361474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.390320] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 185.397763] team0: Port device team_slave_0 added [ 185.405855] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 185.412714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 185.422471] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 185.435689] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 185.443393] team0: Port device team_slave_1 added [ 185.487003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.494139] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.501512] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.527680] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.552374] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.558773] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.568076] device bridge_slave_0 entered promiscuous mode [ 185.585802] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 185.593026] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.618966] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.630645] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 185.640644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 185.647087] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.654228] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.661224] device bridge_slave_1 entered promiscuous mode [ 185.679745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 185.690910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 185.701810] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 185.708032] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.728702] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 185.757027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.766369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.774730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.784867] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 185.793858] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 185.862756] device hsr_slave_0 entered promiscuous mode [ 185.910568] device hsr_slave_1 entered promiscuous mode [ 185.952842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.960780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.968532] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.975009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.982875] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.992260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 186.017856] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 186.028678] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 186.037103] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 186.044063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.052154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.060488] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.066939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.074003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.081068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.089240] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 186.113168] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 186.119399] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.126392] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 186.133537] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.147741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.155805] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 186.163405] team0: Port device team_slave_0 added [ 186.173067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 186.199101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.206122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.214538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.222452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.230075] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.236419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.244466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 186.253979] team0: Port device team_slave_1 added [ 186.281454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.289351] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.295681] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.321217] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.335783] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.342160] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.367763] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.379887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 186.393813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.402813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 186.411891] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 186.418324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 186.426973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.435027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.442796] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.449196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.456151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.464039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.472388] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.485808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.494834] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 186.512383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.522336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.531128] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 186.539992] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 186.605573] device hsr_slave_0 entered promiscuous mode [ 186.660527] device hsr_slave_1 entered promiscuous mode [ 186.705563] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 186.712747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.721018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.728199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.738371] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 186.747170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 186.758124] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 186.769828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 186.777210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.785392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.793372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.801777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.809488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.818961] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 186.825261] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.841706] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 186.847809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 186.864458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 186.879006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 186.894870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.903319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.911265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.919054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.927038] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.933589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.941979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.949043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.961722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 186.978363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.986542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.003534] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.014743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 187.032123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.039942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.047913] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.054291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.061922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.069544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.094417] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 187.108268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.125404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.136981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 187.147665] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 187.157373] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.165896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.173940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.181999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.189631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.196508] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.216641] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 187.223433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.239420] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.248062] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.266882] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.274945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.282989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.289992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.301306] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 187.307507] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.315125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.331850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.342359] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 187.359956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.369412] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.377601] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.387280] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.403606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 187.414730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 187.423284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.432772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.440957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.448839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.456716] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.463114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.470645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.478393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.486118] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.492505] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.499885] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 187.510600] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 187.520746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 187.529290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 187.539379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.547150] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.556327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.563203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.571255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.578687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.586878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.594714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.615503] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 187.621754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.635797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 187.651796] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 187.658905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.670660] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.684030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 187.710886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.721452] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.733463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 187.761416] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 187.767933] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.775766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.785303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.795460] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 187.806510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 187.817398] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 187.826606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.838875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.849548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.857457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.865304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.872296] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.885832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.899066] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.908962] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 187.919577] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 187.926113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.939639] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 187.959651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.968124] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 187.985690] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 187.998764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.015147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.028431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.036001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.046156] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.061280] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 188.069711] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.077077] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.088037] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.095524] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 188.106247] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 188.115337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.128773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.136734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.147568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.159067] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 188.165967] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.174392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.185381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 188.198285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.206581] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.214601] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.221050] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.228732] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.236443] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.244241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.253912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.264137] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 188.272382] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 188.279226] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 188.287609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.296435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.304957] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.311424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.321580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 188.330833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.342702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 188.355985] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 188.365242] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.374094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.382040] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.388693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.396444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.403882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.412389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.419559] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.426692] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.435123] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 188.444095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 188.453766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 188.464627] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 188.473092] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 188.480681] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 188.490332] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.500278] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 188.507844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.518048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.528305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.538571] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.545968] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.554114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.562110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.572391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 188.582713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 188.590891] device veth0_vlan entered promiscuous mode [ 188.599966] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 188.611108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.619017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.627694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.638481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.646231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.653974] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.661143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.668149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.681352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 188.688627] device veth1_vlan entered promiscuous mode [ 188.696662] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 188.705406] device veth0_vlan entered promiscuous mode [ 188.713175] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 188.724884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.736178] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 188.745896] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.756670] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 188.770656] device veth1_vlan entered promiscuous mode [ 188.776489] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 188.783337] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 188.790972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.798651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.806575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.814586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.822464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.829950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.838126] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.847991] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 188.856380] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 188.869827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 188.879833] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 188.887695] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 188.896377] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 188.903867] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 188.915129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.923447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.931435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.938935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.948907] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 188.961285] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 188.967364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.979132] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 188.995809] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 189.009583] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 189.020828] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 189.029022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.037127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.047581] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 189.064967] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 189.078709] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 189.087693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 189.095982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.104335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.112958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.121864] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.128854] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.138091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 189.150946] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 189.159599] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.169353] device veth0_vlan entered promiscuous mode [ 189.175996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.184717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.192369] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.199039] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.208277] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 189.214958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.256645] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 189.264891] device veth0_macvtap entered promiscuous mode [ 189.278101] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 189.286719] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 189.303745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.315227] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.325207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.333505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.341760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 189.349673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 189.359996] device veth0_macvtap entered promiscuous mode [ 189.370626] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 189.378701] device veth1_macvtap entered promiscuous mode [ 189.385359] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 189.396060] device veth1_vlan entered promiscuous mode [ 189.402418] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 189.412882] device veth1_macvtap entered promiscuous mode [ 189.425968] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 189.436149] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 189.454102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 189.466588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 189.477654] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 189.488397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 189.496388] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 189.505017] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.512617] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.519762] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.527445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.534529] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.544319] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 189.553629] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 189.564751] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.574619] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 189.582981] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.592481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 189.603299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.613220] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 189.620992] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.637500] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 189.644837] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 189.652844] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.660859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.668741] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 189.677031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.687756] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 189.695598] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 189.702778] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 189.713993] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 189.724981] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.734020] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 189.748475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 189.759391] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 189.767945] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 189.775833] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 189.786967] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.794902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.803345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 189.811200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.819312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 189.827195] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.835537] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.842759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.851261] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 189.862669] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 189.870122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.877778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.894876] device veth0_vlan entered promiscuous mode [ 189.906062] device veth0_macvtap entered promiscuous mode [ 189.916464] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 189.936088] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 189.950732] device veth1_macvtap entered promiscuous mode [ 189.958240] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 189.977982] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.992804] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.999958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.008679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.017237] device veth1_vlan entered promiscuous mode [ 190.023910] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 190.034504] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 190.043757] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 190.074182] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 190.091236] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 190.106529] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 190.129226] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.155894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.166398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.176401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.186583] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 190.194128] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.200804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.208542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.216638] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.224545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.235242] device veth0_macvtap entered promiscuous mode [ 190.242615] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 190.253654] device veth1_macvtap entered promiscuous mode [ 190.259863] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 190.268887] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 190.285352] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 190.295639] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 190.302946] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 190.310914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.321277] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.330984] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.340816] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.350970] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 190.357846] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.368098] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 190.376715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 190.388035] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 190.400482] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 190.407852] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.415912] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.426576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.434808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.443711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.451844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.459106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.466766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.474385] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.491427] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 190.508084] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.524673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.534655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.544826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.554502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 190.564765] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.575352] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 190.583070] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.591260] device veth0_vlan entered promiscuous mode [ 190.606793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.617064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.644420] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.658525] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.668969] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.679351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.689592] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 190.699354] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.709672] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 190.717073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.725935] device veth1_vlan entered promiscuous mode [ 190.735492] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 190.744317] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 190.753496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.762399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.793803] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 190.807755] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 190.815170] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 190.823075] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 190.841041] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 190.848170] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 190.861309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.873505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.882625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.889863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.900743] device veth0_vlan entered promiscuous mode [ 190.924871] device veth1_vlan entered promiscuous mode [ 190.931890] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 190.945089] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 190.957050] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 190.991948] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 191.016052] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 191.028215] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready 20:49:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x0, @in=@empty, 0x3500, 0x0, 0x0, 0x0, 0xff}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) recvmsg(r0, &(0x7f00000017c0)={&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000480)=""/6, 0x6}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/24, 0x18}, {&(0x7f0000001500)=""/39, 0x27}, {&(0x7f0000001540)=""/95, 0x5f}, {&(0x7f00000015c0)=""/176, 0xb0}], 0x6, &(0x7f0000001700)=""/186, 0xba}, 0x2) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000001800), &(0x7f0000001840)=0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x1, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) [ 191.041177] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.049124] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.062749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.078182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.097616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.121578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.132139] device veth0_macvtap entered promiscuous mode [ 191.138375] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready 20:49:00 executing program 0: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000000010000000000000000000008000500ac1414aa080002000000000008000500ac1414aa0c0003000000000000000000f8ff0000", @ANYRES32=r1], 0x4}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 191.148828] device veth0_macvtap entered promiscuous mode [ 191.163077] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 191.181498] device veth1_macvtap entered promiscuous mode [ 191.230033] hrtimer: interrupt took 48857 ns [ 191.248223] device veth1_macvtap entered promiscuous mode [ 191.284042] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 191.299770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 191.316408] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 191.324818] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 191.324860] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 191.341243] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 191.348496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 191.372726] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 191.394650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.405528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.446605] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.463148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.475810] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.485982] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.495269] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.505392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.516646] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 191.524022] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.533398] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.543391] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.552656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.562716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.572552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.582304] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:49:00 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000000)=0x7) [ 191.592133] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.602101] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.612609] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 191.619555] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 191.646289] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.654001] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.667698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.677235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 20:49:00 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87}, {0x0, 0x0, 0x5}, {0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0x0, @in=@empty, 0x3500, 0x0, 0x0, 0x0, 0xff}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) syz_mount_image$cifs(&(0x7f00000000c0)='cifs\x00', 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) recvmsg(r0, &(0x7f00000017c0)={&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000480)=""/6, 0x6}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/24, 0x18}, {&(0x7f0000001500)=""/39, 0x27}, {&(0x7f0000001540)=""/95, 0x5f}, {&(0x7f00000015c0)=""/176, 0xb0}], 0x6, &(0x7f0000001700)=""/186, 0xba}, 0x2) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000001800), &(0x7f0000001840)=0x4) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0x1, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) [ 191.693305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.701515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.714745] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 191.735404] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.746751] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.758012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.768344] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.778651] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.788783] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.798301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.808103] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.817393] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 191.827299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.839174] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 191.847138] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 191.859068] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.876075] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.902123] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.918255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.940964] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 191.948962] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.962341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 191.989519] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 191.999411] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.008745] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.018488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.027655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.037409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 20:49:01 executing program 0: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000480)={0x990000, 0x80, 0xf39, r3, 0x0, &(0x7f0000000140)={0x990afe, 0x9, [], @p_u16=&(0x7f0000000100)=0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24040811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="534fce983e5c2d7673b4958005e750e907d4fdc7bf13d088ad203bd736a916945b0f66f933a31733392547e20febfc8d209cbf74cde243bf2406fae4ddbe02d390fffad64b012deb14b92f020709e51b3e84a45b53c64c5aa753b3531c693655564c9a8ddb7d983a19eb11f0803dced96346ee580ea4a890f90a69b44067df0949c216f3b291122bcd89a0777619426cacf7375a9e293541d7f70f4c738e9580acb79cc9465802b2a647ecf12edffdca4a00493580b7c2c846f1a8bd3609d25a90e6f566609a73002762a2293a435c82a31624f5ecd4951aa455faade3a054552be833f7e8d36990ce33215c37fb9a705dd25c047668a5c3722f4c5bc28c4ee8898d88e31249734df2ffb3a84b62cf45d556dddcd15a1f"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000440)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000500)) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000006c0)={0xa10000, 0x3, 0x7, r0, 0x0, &(0x7f0000000680)={0x9e0901, 0x4, [], @p_u8=&(0x7f0000000640)}}) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 192.047683] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 192.054908] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.073342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.087311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 20:49:01 executing program 5: socketpair$unix(0x1, 0x8000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x200, 0xfffffffffffffffd}, {0x0, 0x0, 0x0, 0x3}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfd, 0x40000}, 0xc) dup3(r0, r3, 0x0) 20:49:01 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)}}], 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000240)={0x0, 'wg1\x00', {0x2}}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x48c01) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x1, 0x70bd2d, 0x0, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 20:49:01 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet6(0xa, 0x80006, 0x9) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r0, 0x0) socket$caif_stream(0x25, 0x1, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x24, r5, 0x711, 0x0, 0x0, {0x9}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, r5, 0x104, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x20}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9b7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x80000000}]}, 0x34}, 0x1, 0x0, 0x0, 0x40001}, 0x40000) listen(r0, 0x0) [ 192.404732] device vxlan0 entered promiscuous mode [ 192.672311] device vxlan0 entered promiscuous mode 20:49:03 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="4522a0adc19c9f648c2e7d5d1abcde6b4be0111b934e0cb253d94a3de1efd37fc49b2fa4a51200"/53, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="070000004000000000a905f3d8ffd20e6586b72fd5d76e570000000200000000000000000000000000000012000000080000002f646576dd214c41945f8408d52379cc65722b90a5052f696e7075742f6576656e74230003026178f113290b9ba3c8161900000000000600edffffff0000000000000000000000000000000000000000000000050000000000000001000000000000000700400000000000f2000000000000007f00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="094000000100ffff000000000200000000000000000000000000000012000000050000002f6465762f696e7075742f6576656e7423000000000000000000000000000000020000000000000009000000000000000500000000000000000000000000000002000000000000009a050000000000008308000000000000ba090000000000009c0000000000000004000000000000000700000000000000000000000001000028510000", @ANYRES32=r1, @ANYRES32=0xee00], 0x280) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 20:49:03 executing program 5: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x1410, 0x2, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x5) 20:49:03 executing program 0: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000480)={0x990000, 0x80, 0xf39, r3, 0x0, &(0x7f0000000140)={0x990afe, 0x9, [], @p_u16=&(0x7f0000000100)=0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24040811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="534fce983e5c2d7673b4958005e750e907d4fdc7bf13d088ad203bd736a916945b0f66f933a31733392547e20febfc8d209cbf74cde243bf2406fae4ddbe02d390fffad64b012deb14b92f020709e51b3e84a45b53c64c5aa753b3531c693655564c9a8ddb7d983a19eb11f0803dced96346ee580ea4a890f90a69b44067df0949c216f3b291122bcd89a0777619426cacf7375a9e293541d7f70f4c738e9580acb79cc9465802b2a647ecf12edffdca4a00493580b7c2c846f1a8bd3609d25a90e6f566609a73002762a2293a435c82a31624f5ecd4951aa455faade3a054552be833f7e8d36990ce33215c37fb9a705dd25c047668a5c3722f4c5bc28c4ee8898d88e31249734df2ffb3a84b62cf45d556dddcd15a1f"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000440)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000500)) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000006c0)={0xa10000, 0x3, 0x7, r0, 0x0, &(0x7f0000000680)={0x9e0901, 0x4, [], @p_u8=&(0x7f0000000640)}}) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:49:03 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)}}], 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000240)={0x0, 'wg1\x00', {0x2}}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x4) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x48c01) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x1, 0x70bd2d, 0x0, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 20:49:03 executing program 2: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000480)={0x990000, 0x80, 0xf39, r3, 0x0, &(0x7f0000000140)={0x990afe, 0x9, [], @p_u16=&(0x7f0000000100)=0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24040811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000440)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000500)) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000006c0)={0xa10000, 0x3, 0x7, r0, 0x0, &(0x7f0000000680)={0x9e0901, 0x4, [], @p_u8=&(0x7f0000000640)}}) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:49:03 executing program 3: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) io_destroy(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, r1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x8000, 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:nvram_device_t:s0\x00', 0x24, 0x0) close(r3) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) splice(r2, 0x0, r3, 0x0, 0x100000002, 0x0) [ 194.179907] device vxlan0 entered promiscuous mode 20:49:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100), 0xc, 0x0}, 0x24045005) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x20000000000000, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x4c8, 0x1, 0x0, 0x0, 0x810], 0x0, 0x280781}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000040)='./file1\x00', 0x9d, 0xaaaaaaaaaaaad81, &(0x7f0000000000)=[{&(0x7f00000001c0)="584653420000100000000000000010000000e1ffffff0000000000000000000034fb8fb9e4a016073194ba41b964d669ad0c4926b2bf48b6ad26c5040000000000000d880000000000000d890000000000000d8a00000000000010000000000100000000000003", 0x67}], 0x9840c, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$selinux_user(r1, &(0x7f0000000080)={'/usr/sbin/cups-browsed', 0x20, 'root\x00'}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) r5 = getegid() getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000d80)=ANY=[@ANYBLOB="18040000daffffff05000000000000000100000000000000020000000000000000010000000000000400000000000000030000002e1e0000050000000000000001000000000000000900000000000000000800000000000000000000000000000e08000000000000000000006a00000001000100d369000071000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="00000000800000000000000000000000000000000500000000000000070000000200000073656c696e75780006000000000000000000000000000000855100000000000003000000000000000000000000000000000000000000000081000000000000000600000000000000f7ffffffffffffff000000000000000005000000000000000100000005000000060000000300000001000080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000000860200000000000000000000000000007fffffffffffffff15000000fcffffff297573657247504c766d6e65743024776e6f64657600000001000000000000000200000000000000040000000000000000000000000000000500000000080000000000000000000001000000000000000000000000000000fffeffffffffffffffffff7f00000000050000000000000002000000040000000600000033000000ffffff7f", @ANYRES32=0xee01, @ANYBLOB="0700000040000000000000000200000000000000000000000000000012000000080000002f6465762f696e7075742f6576656e7423000000000000000600000000000000000000000000000000000000000000000300000000000000400000000000000005000000000000000100000000000000070000000000000003000000000000007f00000000000000ff0100000000000002000000010000000000010000140000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0400000000000000000000000000000000000000000000000000001010000000f5c6000027707070302e2d6c6f32776c616e3000020000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000040000000000000006000000000000000000000007000000160000000600000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="094000000100ffff000000000200000000000000000000000000000012000000050000002f6465762f696e7075742f6576656e7423000000000000000000000000000000020000000000000009000000000000000500000000000000000000000000000002000000000000009a050000000000008308000000000000ba090000000000009c0000000000000004000000000000000700000000000000000000000001000028510000", @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="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"], 0x413) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r8, 0x0) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030e70000000000008287aaa2757365725f69643d", @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r5, @ANYBLOB="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", @ANYRESDEC=r8, @ANYBLOB=',\x00']) [ 194.342291] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 194.347796] device vxlan0 entered promiscuous mode 20:49:03 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xa2a5, &(0x7f0000000100)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5001000010000307ebff0006f2c6000040040000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a00100000002500120008000100766574680000000018000200000033d2b2bde9d40319696b905711068b27da6fff0744d4d2176644649a1f5319f68d2b13651a643ba1d864dc423db53c56eb2b04361992d76d9b57a78d0d77e9080000000000000064516012857d445602af835297c84c211911e5fadece87db5a8894f36a19f7ba231dacc61ef4b8524330461a0db46abb795fdcd89a50852f130a289058c679d9b7b4a8d431967f19e4c751345f329eda6a8319f34682c1a78f12b833298d9a99213f648d6cff2dc66a3c4d0bda36b33ff4f865693075573f751d6daa4510b1b1884cd04620e961722371f95dc876c10f52087ec66ee60caf5efd00375950b50fab8b4a85ee3b7b2563da8700000000000000003d472230d9e10000bc3659c1c8dcf542b669890e89f36f8b7e2c86a5aa9230b7b3470d3fb150819c43528f6f189d5fea75dad19f272894b860669b33c3", @ANYRES32=0x0, @ANYBLOB="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"], 0x200}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x123000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0xe5fb, 0x8, 0xff, 0x7, 0x4, 0x9}) r1 = socket(0x10, 0x800000000080002, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) epoll_create(0xb9) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFT_MSG_GETTABLE(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="60000000010a050000000000000000000c000005080002400000000008000240000000000900010073797a300000000008000240000000010900010073797a30000000000900010073797a300000000008fd02400000ff0f0800024000000001d61a0f5340abef6f867963bfceb9ec3a11887639a4f4547a85240ba37d5e12"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x94, "bdfef3d9c075c8b0633ee32294ccb492f54e0ef67c92b2987726b26685eefe318c2df8d394d73e365427e32c397c42189e3acc582e44e5157047fc2dafc20b82d299f5d00556c767bc36578856c1871e9f7769ea2295f1c863baf19293c4db8293c3270c19f440bdb499b0fdc73b24b424a107665ad9fce66d7bbb674515e464a66440034c1ce4619343ec9dcdeb27b0a59b1108"}, &(0x7f0000000340)=0xb8) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x6815, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a3e, 0x0) 20:49:03 executing program 0: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000480)={0x990000, 0x80, 0xf39, r3, 0x0, &(0x7f0000000140)={0x990afe, 0x9, [], @p_u16=&(0x7f0000000100)=0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24040811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000440)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000500)) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000006c0)={0xa10000, 0x3, 0x7, r0, 0x0, &(0x7f0000000680)={0x9e0901, 0x4, [], @p_u8=&(0x7f0000000640)}}) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 194.728185] netlink: 256 bytes leftover after parsing attributes in process `syz-executor.3'. [ 194.753969] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.3'. [ 194.811629] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 194.832023] team0: Port device veth3 added [ 194.847259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pig=7784 comm=syz-executor.3 20:49:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff}}, 0xe8) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="01f4ff00", @ANYRES32=0x0], 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000902000000a8a988ea0000007ba79574350379f4e1894cdddb4e667263a7192ff58ab16f88b9668b145e6313f3ee41e2f282687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8f5f819b383803f6c871ceef4aa6dac6acb5ded04e543506a3bfcb71eda4bf258d5e649caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a1f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adff0000"], 0x10}}, 0x0) 20:49:04 executing program 2: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="1900000000000500902eda40fa21d5c68f13", 0x12, 0x400}], 0x8880, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000100000008000500ac141400080002000000000008000400ffffffff0c0003000000000000000000060006000000000008000100", @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="0617efd875ffdb5a0e1c3956ddc10bf7dd4cbbe9e997df0827c179b8631b4e32bb7d204164c09f16b9e127ce2b24e6999d855b367aa949d8d829a8d6c14f1a8a75af8ed18c6d738a5051c767c3b4920de755727f6f81d70e959beb433db37850103cc458e830e5eb3bfa906bad54ebeb4dbf30b49370aa404aa1857a33e74003868eb2dbbd381e0b55ddd9657d816800e887edfa65d081c8f277fb876c2758"], 0x50}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8f32ed8eeb469f62}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x14, r3, 0x4, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x44}, 0x0) [ 194.976878] device vxlan0 entered promiscuous mode 20:49:04 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="4522a0adc19c9f648c2e7d5d1abcde6b4be0111b934e0cb253d94a3de1efd37fc49b2fa4a51200"/53, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="070000004000000000a905f3d8ffd20e6586b72fd5d76e570000000200000000000000000000000000000012000000080000002f646576dd214c41945f8408d52379cc65722b90a5052f696e7075742f6576656e74230003026178f113290b9ba3c8161900000000000600edffffff0000000000000000000000000000000000000000000000050000000000000001000000000000000700400000000000f2000000000000007f00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="094000000100ffff000000000200000000000000000000000000000012000000050000002f6465762f696e7075742f6576656e7423000000000000000000000000000000020000000000000009000000000000000500000000000000000000000000000002000000000000009a050000000000008308000000000000ba090000000000009c0000000000000004000000000000000700000000000000000000000001000028510000", @ANYRES32=r1, @ANYRES32=0xee00], 0x280) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 20:49:04 executing program 3: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x2f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r2) r3 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 20:49:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchdir(r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002b80)=[{{&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000440)=""/128, 0x80}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000740)=""/217, 0xd9}, {&(0x7f0000000840)=""/222, 0xde}, {&(0x7f0000002980)=""/148, 0x94}, {&(0x7f0000000a00)=""/126, 0x7e}], 0x8, &(0x7f0000000b40)=""/205, 0xcd}, 0xc14b}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/81, 0x51}, {&(0x7f00000001c0)=""/43, 0x2b}, {&(0x7f0000000cc0)=""/226, 0xe2}, {&(0x7f0000000140)=""/48, 0x30}, {&(0x7f00000002c0)=""/39, 0x27}, {&(0x7f0000000dc0)=""/221, 0xdd}, {&(0x7f0000000ec0)=""/144, 0x90}], 0x7, &(0x7f0000000340)=""/45, 0x2d}, 0x3f}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001000)=""/236, 0xec}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000001100)=""/250, 0xfa}, {&(0x7f0000001200)=""/220, 0xdc}, {&(0x7f0000001300)=""/218, 0xda}], 0x5, &(0x7f0000001480)=""/87, 0x57}, 0x8}, {{&(0x7f0000001500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000640)=""/49, 0x31}], 0x1, &(0x7f0000010040)=""/102400, 0x19000}, 0x6}, {{&(0x7f0000001600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/95, 0x5f}, {&(0x7f0000001700)=""/163, 0xa3}, {&(0x7f0000002880)=""/200, 0xc8}, {&(0x7f0000002dc0)=""/206, 0xce}], 0x4, &(0x7f0000002a40)=""/120, 0x78}, 0x5}, {{&(0x7f0000002ac0), 0x80, &(0x7f0000002b40)=[{&(0x7f0000001800)=""/55, 0x37}], 0x1}, 0x200}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe(0x0) 20:49:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r3, 0x40045431, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfffff602}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xfffffffffffffd49, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r5 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(r5, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x54, 0xd, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x54}}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x200000000000000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f00000004c0)={0x1f, @none}, 0x8) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 20:49:04 executing program 0: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000480)={0x990000, 0x80, 0xf39, r3, 0x0, &(0x7f0000000140)={0x990afe, 0x9, [], @p_u16=&(0x7f0000000100)=0x9}}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24040811) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r4, 0xc0045520, &(0x7f0000000040)) ioctl$USBDEVFS_DISCARDURB(0xffffffffffffffff, 0x550b, &(0x7f0000000440)) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r5, 0xc0bc5310, &(0x7f0000000500)) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000006c0)={0xa10000, 0x3, 0x7, r0, 0x0, &(0x7f0000000680)={0x9e0901, 0x4, [], @p_u8=&(0x7f0000000640)}}) r6 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 195.343428] syz-executor.0 (7788) used greatest stack depth: 24496 bytes left [ 195.580444] audit: type=1804 audit(1585342144.765:42): pid=7838 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir278666163/syzkaller.4FBwbH/3/file0/bus" dev="loop2" ino=3 res=1 [ 196.027424] syz-executor.1 (7795) used greatest stack depth: 24368 bytes left 20:49:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fchdir(r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002b80)=[{{&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000440)=""/128, 0x80}, {&(0x7f0000000580)=""/192, 0xc0}, {&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000740)=""/217, 0xd9}, {&(0x7f0000000840)=""/222, 0xde}, {&(0x7f0000002980)=""/148, 0x94}, {&(0x7f0000000a00)=""/126, 0x7e}], 0x8, &(0x7f0000000b40)=""/205, 0xcd}, 0xc14b}, {{0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000c40)=""/81, 0x51}, {&(0x7f00000001c0)=""/43, 0x2b}, {&(0x7f0000000cc0)=""/226, 0xe2}, {&(0x7f0000000140)=""/48, 0x30}, {&(0x7f00000002c0)=""/39, 0x27}, {&(0x7f0000000dc0)=""/221, 0xdd}, {&(0x7f0000000ec0)=""/144, 0x90}], 0x7, &(0x7f0000000340)=""/45, 0x2d}, 0x3f}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001000)=""/236, 0xec}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000001100)=""/250, 0xfa}, {&(0x7f0000001200)=""/220, 0xdc}, {&(0x7f0000001300)=""/218, 0xda}], 0x5, &(0x7f0000001480)=""/87, 0x57}, 0x8}, {{&(0x7f0000001500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000640)=""/49, 0x31}], 0x1, &(0x7f0000010040)=""/102400, 0x19000}, 0x6}, {{&(0x7f0000001600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/95, 0x5f}, {&(0x7f0000001700)=""/163, 0xa3}, {&(0x7f0000002880)=""/200, 0xc8}, {&(0x7f0000002dc0)=""/206, 0xce}], 0x4, &(0x7f0000002a40)=""/120, 0x78}, 0x5}, {{&(0x7f0000002ac0), 0x80, &(0x7f0000002b40)=[{&(0x7f0000001800)=""/55, 0x37}], 0x1}, 0x200}], 0x6, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8400fffffffa) creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe(0x0) [ 196.226791] audit: type=1804 audit(1585342144.845:43): pid=7841 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir278666163/syzkaller.4FBwbH/3/file0/bus" dev="loop2" ino=3 res=1 20:49:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff}}, 0xe8) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="01f4ff00", @ANYRES32=0x0], 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000902000000a8a988ea0000007ba79574350379f4e1894cdddb4e667263a7192ff58ab16f88b9668b145e6313f3ee41e2f282687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8f5f819b383803f6c871ceef4aa6dac6acb5ded04e543506a3bfcb71eda4bf258d5e649caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a1f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adff0000"], 0x10}}, 0x0) 20:49:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r3, 0x40045431, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfffff602}, @BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x30}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xfffffffffffffd49, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r5 = creat(&(0x7f00000000c0)='./bus/file0\x00', 0x0) write$FUSE_NOTIFY_RETRIEVE(r5, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x54, 0xd, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x54}}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x0, 0x200000000000000, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$bt_sco(0xffffffffffffffff, &(0x7f00000004c0)={0x1f, @none}, 0x8) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x0, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 196.417602] device vxlan0 entered promiscuous mode 20:49:05 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="4522a0adc19c9f648c2e7d5d1abcde6b4be0111b934e0cb253d94a3de1efd37fc49b2fa4a51200"/53, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="070000004000000000a905f3d8ffd20e6586b72fd5d76e570000000200000000000000000000000000000012000000080000002f646576dd214c41945f8408d52379cc65722b90a5052f696e7075742f6576656e74230003026178f113290b9ba3c8161900000000000600edffffff0000000000000000000000000000000000000000000000050000000000000001000000000000000700400000000000f2000000000000007f00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="094000000100ffff000000000200000000000000000000000000000012000000050000002f6465762f696e7075742f6576656e7423000000000000000000000000000000020000000000000009000000000000000500000000000000000000000000000002000000000000009a050000000000008308000000000000ba090000000000009c0000000000000004000000000000000700000000000000000000000001000028510000", @ANYRES32=r1, @ANYRES32=0xee00], 0x280) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 20:49:05 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xec57}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x32}, 0x0, @in=@loopback, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7ff}}, 0xe8) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="01f4ff00", @ANYRES32=0x0], 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0207000902000000a8a988ea0000007ba79574350379f4e1894cdddb4e667263a7192ff58ab16f88b9668b145e6313f3ee41e2f282687a25340b61976cae3a9a9e90785afd31885d362411ef23cd8f5f819b383803f6c871ceef4aa6dac6acb5ded04e543506a3bfcb71eda4bf258d5e649caab8d914916ee79d501a3aa4f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a1f1a3ea4c057bfc8af28e2b90e1d3dd7fe6e38d2d29be9a5adff0000"], 0x10}}, 0x0) 20:49:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000380)=0x1a, 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x4b800) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0xa00) getresuid(0x0, &(0x7f0000000800), &(0x7f0000000840)=0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="4522a0adc19c9f648c2e7d5d1abcde6b4be0111b934e0cb253d94a3de1efd37fc49b2fa4a51200"/53, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="070000004000000000a905f3d8ffd20e6586b72fd5d76e570000000200000000000000000000000000000012000000080000002f646576dd214c41945f8408d52379cc65722b90a5052f696e7075742f6576656e74230003026178f113290b9ba3c8161900000000000600edffffff0000000000000000000000000000000000000000000000050000000000000001000000000000000700400000000000f2000000000000007f00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="094000000100ffff000000000200000000000000000000000000000012000000050000002f6465762f696e7075742f6576656e7423000000000000000000000000000000020000000000000009000000000000000500000000000000000000000000000002000000000000009a050000000000008308000000000000ba090000000000009c0000000000000004000000000000000700000000000000000000000001000028510000", @ANYRES32=r1, @ANYRES32=0xee00], 0x280) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b00)) 20:49:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000480)=""/151) socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 197.127470] audit: type=1800 audit(1585342146.315:44): pid=7915 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16566 res=0 [ 197.270777] MINIX-fs: mounting unchecked file system, running fsck is recommended 20:49:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000200000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa81000000", 0x17, 0x3}], 0x1402, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0x9) fdatasync(r0) setgid(r1) setgid(0x0) sync() setgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 20:49:06 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000040)="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") sendfile(r1, r0, 0x0, 0x4000000000010046) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000240)={0x9, [0x2d, 0x0, 0x1c51, 0x1, 0x1, 0xa8c, 0x5, 0x5, 0x3ff]}, 0x16) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0x0, 0x7, {0x3}}, 0x18) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$x25(r8, &(0x7f0000000180), &(0x7f00000001c0)=0x12, 0x80000) [ 197.473518] minix_free_inode: bit 1 already cleared 20:49:06 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) syz_genetlink_get_family_id$ipvs(0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000480)=""/151) socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 20:49:06 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty=0xff000000}}) [ 197.692113] audit: type=1800 audit(1585342146.885:45): pid=7966 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16484 res=0 [ 197.950631] audit: type=1804 audit(1585342147.145:46): pid=7991 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir278666163/syzkaller.4FBwbH/4/file0/bus" dev="loop2" ino=4 res=1 20:49:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$getownex(r1, 0x10, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) socket$inet(0x2, 0x803, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x4010, r1, 0xffffc000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000700)='nl80211\x00') geteuid() r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) setresgid(0x0, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 198.214832] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 198.216139] audit: type=1804 audit(1585342147.215:47): pid=7993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir278666163/syzkaller.4FBwbH/4/file0/bus" dev="loop2" ino=4 res=1 [ 198.321217] minix_free_inode: bit 1 already cleared [ 198.397061] audit: type=1400 audit(1585342147.585:48): avc: denied { map } for pid=7997 comm="syz-executor.3" path="socket:[29662]" dev="sockfs" ino=29662 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 20:49:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{&(0x7f0000002c00)=@x25, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/118) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x3, 0x6, 0x8, 0x0, 0x6, 0x1, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40000, 0x6, 0x1, 0x2, 0x1, 0x280, 0xbf3}, r5, 0xf, r4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)={@ipv4={[0x0, 0x5, 0x4], [], @initdev}}, 0x20) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x14000) 20:49:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000004c0)) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x206000, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) 20:49:07 executing program 0: socket$inet6(0x10, 0x2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x400) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000040)}, 0x10) 20:49:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x10000039, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x3) syz_open_dev$vcsa(0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000700)=[{{&(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/187, 0xbb}], 0x1}, 0x1ff}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x6) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x3, 0x70, 0x69, 0x1, 0x0, 0x40, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x524140, 0x0) creat(&(0x7f0000000300)='./bus\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='pids.current\x00', 0x275a, 0x0) r5 = creat(&(0x7f00000001c0)='./bus\x00', 0x48) fallocate(0xffffffffffffffff, 0x0, 0x4, 0x8) fallocate(r4, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5}) 20:49:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty=0xff000000}}) 20:49:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) msgget(0x1, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="bbbb86ce0c2ab04f4bc401c66032e57f8a8fec8dabfec903b0ad99b0cea006469ea78ef63ba3877c1bc717f227ff3192506404526f75cdd221cb7fa7b3c18a1a0dd8ca339216ddb908c4229c249b46b085bfe12f518c0e1b0fab8dff9b60ffa52686b0a41f0304718c297f82a55221cc89f0bdd3c907d843756c3069ebb5c05ac592254f411d6984a570", @ANYRES16=0x0, @ANYBLOB="020000000000fedbdf250b0000001c00098008000100a402000008000200c9230000080001007f0000005000018038000400200001000a004e2400000007fe8000000000000000000000000000bb010000001400020002004e20ac14143c000000000000000014000280080002000000000008000400ffff0000"], 0x80}, 0x1, 0x0, 0x0, 0x40002}, 0x14) 20:49:07 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x80002, 0x0) getsockname$packet(r2, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @empty, 0x1}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="30000000100001fa52a342f5ca27bfb5bbffb2c2", @ANYRES32=0x0, @ANYBLOB="00000000000000374ecac5ee2997da43d88e6c87a03413b877d4a6d491781d9c6b078b880beac130b601d5df8ecb7ec1e6f08bca6adf21a2e2b084a8d9c0aa0f1d9c95df037e747c4a7d0cf965726f3b510651ae557ab26429e354d0660d63b6e906000000000000000473d723", @ANYRES32=r3, @ANYBLOB="08001b0000000000"], 0x30}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8943, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) [ 198.704804] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 198.804618] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 20:49:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{&(0x7f0000002c00)=@x25, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/118) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x3, 0x6, 0x8, 0x0, 0x6, 0x1, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40000, 0x6, 0x1, 0x2, 0x1, 0x280, 0xbf3}, r5, 0xf, r4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)={@ipv4={[0x0, 0x5, 0x4], [], @initdev}}, 0x20) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x14000) 20:49:08 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = userfaultfd(0x400) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000600)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3ff}, 0x0, 0x0, 0x4, 0x9, 0x10000, 0x3, 0x5, 0x3ff, 0x3, 0x9}) fcntl$setown(r1, 0x8, r0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000020c0)=[{{&(0x7f0000000580)=@isdn, 0x80, &(0x7f0000002040)=[{&(0x7f0000001e80)=""/100, 0x64}, {0x0}, {0x0}, {&(0x7f0000001f40)=""/49, 0x31}, {0x0}, {0x0}], 0x6}}, {{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x503, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000180)="a497515621ce457f1986542c950100", 0xf, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r6, r5, r5}, &(0x7f0000000280)=""/250, 0xfa, &(0x7f0000000580)={&(0x7f0000000080)={'sha256-generic\x00'}}) [ 199.186776] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 199.214990] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 199.217422] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 20:49:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{&(0x7f0000002c00)=@x25, 0x80, &(0x7f0000002d80)=[{&(0x7f0000002d40)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x7000) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/118) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6}, 0x0) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000002c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x3, 0x6, 0x8, 0x0, 0x6, 0x1, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f00000000c0), 0x9}, 0x40000, 0x6, 0x1, 0x2, 0x1, 0x280, 0xbf3}, r5, 0xf, r4, 0x1) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)={@ipv4={[0x0, 0x5, 0x4], [], @initdev}}, 0x20) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x14000) 20:49:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000004c0)) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x206000, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) 20:49:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@fat=@tz_utc='tz=UTC'}]}) 20:49:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x5, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002c40)=[{{&(0x7f00000000c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/99, 0x65}, {&(0x7f00000004c0)=""/229, 0xe5}], 0x2, &(0x7f00000005c0)=""/249, 0xf9}}, {{&(0x7f0000002dc0)=@nl, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000740)=""/45, 0x2d}, {&(0x7f0000000780)=""/201, 0xfffffeb9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/218, 0xda}, {&(0x7f0000001980)=""/12, 0xc}, {&(0x7f00000019c0)=""/68, 0x44}, {&(0x7f0000001a40)=""/16, 0x10}, {&(0x7f0000001a80)=""/55, 0x3d}], 0x8, &(0x7f0000002e40)=""/160, 0xa0}, 0x3f3}, {{&(0x7f0000001c00)=@tipc, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c80)=""/2, 0x2}], 0x1, &(0x7f0000001d00)=""/209, 0xd1}, 0x2}, {{&(0x7f0000001e00)=@can, 0x80, &(0x7f0000002380)=[{&(0x7f0000001e80)=""/28, 0x1c}, {&(0x7f0000001ec0)=""/238, 0xee}, {&(0x7f0000001fc0)=""/76, 0x4c}, {&(0x7f0000002040)=""/182, 0xb9}, {&(0x7f0000002100)=""/250, 0xfa}, {&(0x7f0000002200)=""/144, 0x90}, {&(0x7f00000022c0)=""/174, 0xae}], 0x7, &(0x7f0000002400)=""/232, 0xe8}, 0x1}, {{&(0x7f0000002500)=@caif=@util, 0x80, &(0x7f0000002880)=[{&(0x7f0000002580)=""/143, 0x8f}, {&(0x7f0000002640)=""/112, 0x70}, {&(0x7f00000006c0)=""/82, 0x52}, {&(0x7f0000002740)=""/25, 0x19}, {&(0x7f0000001b40)=""/134, 0x86}, {&(0x7f0000002840)=""/28, 0x1c}], 0x6, &(0x7f0000002900)=""/193, 0xc1}, 0x4}, {{0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000002f00)=""/225, 0xdf}], 0x1, &(0x7f0000002b40)=""/245, 0xf5}, 0x8}], 0x6, 0x2000, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8000000000001e, 0x5, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8004000, 0x0, 0x0}], 0x1, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000440), 0x6}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000280)={'syz'}, &(0x7f0000000600), 0x0, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x0, @ipv4={[0x0, 0x0, 0x0, 0xfec0000000000000], [], @local}}, @in={0x2, 0x0, @remote}], 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @local}], 0x20) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000300)={0x48179569, 0x0, 0x2d, "98a6b3c376b56139ef76955a7bd4b741031ea59211dbc227cb8365e8bef849a96fded221d89649c56ab0344036b063785110b994d2c19fc8fad54bf7", 0x10, "8bb55de6f5ae6bdfbc739c0e40fd10dae559a6974a4351d108809c0d1234efc52ddfa95d1647dd26c711c1dd75b02deddf41ac31dd780fd4051e4ff6", 0xa0}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e22, @remote}, @in={0x2, 0x4e22, @local}], 0x20) dup3(r5, 0xffffffffffffffff, 0x80000) 20:49:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) msgget(0x1, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="bbbb86ce0c2ab04f4bc401c66032e57f8a8fec8dabfec903b0ad99b0cea006469ea78ef63ba3877c1bc717f227ff3192506404526f75cdd221cb7fa7b3c18a1a0dd8ca339216ddb908c4229c249b46b085bfe12f518c0e1b0fab8dff9b60ffa52686b0a41f0304718c297f82a55221cc89f0bdd3c907d843756c3069ebb5c05ac592254f411d6984a570", @ANYRES16=0x0, @ANYBLOB="020000000000fedbdf250b0000001c00098008000100a402000008000200c9230000080001007f0000005000018038000400200001000a004e2400000007fe8000000000000000000000000000bb010000001400020002004e20ac14143c000000000000000014000280080002000000000008000400ffff0000"], 0x80}, 0x1, 0x0, 0x0, 0x40002}, 0x14) [ 199.585559] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 199.623685] FAT-fs (loop1): bogus number of reserved sectors [ 199.629769] FAT-fs (loop1): Can't find a valid FAT filesystem 20:49:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) msgget(0x1, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="bbbb86ce0c2ab04f4bc401c66032e57f8a8fec8dabfec903b0ad99b0cea006469ea78ef63ba3877c1bc717f227ff3192506404526f75cdd221cb7fa7b3c18a1a0dd8ca339216ddb908c4229c249b46b085bfe12f518c0e1b0fab8dff9b60ffa52686b0a41f0304718c297f82a55221cc89f0bdd3c907d843756c3069ebb5c05ac592254f411d6984a570", @ANYRES16=0x0, @ANYBLOB="020000000000fedbdf250b0000001c00098008000100a402000008000200c9230000080001007f0000005000018038000400200001000a004e2400000007fe8000000000000000000000000000bb010000001400020002004e20ac14143c000000000000000014000280080002000000000008000400ffff0000"], 0x80}, 0x1, 0x0, 0x0, 0x40002}, 0x14) [ 199.891288] audit: type=1400 audit(1585342149.085:49): avc: denied { name_bind } for pid=8088 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 20:49:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = open(0x0, 0x0, 0x2) r1 = getpid() r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x9, 0x9, 0x0, 0xf7, 0x0, 0x200, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd2b, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x400, 0x6, 0x1, 0x1, 0x4, 0x521, 0x2}, r2, 0xb, r0, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x5, 0x0, 0xfffffffffffffffc}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = request_key(&(0x7f0000000180)='id_resolver\x00', 0x0, &(0x7f0000000240)='eth1!posix_acl_accessmd5sumwlan1md5sumvmnet0[\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r6}, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="23acb6329811af760a31d0bef4214b36130b06a9f243001c2b2b03dafe20377ac82613ea9fddcf5b1f4169ff8d63ea10ac13618f0e3db28e9051607dd87171f3af05a87caf46c324d41b8b333fd762cfebf0e8ad4069cee8ab154684272f0c3ead3b6469f99629ecddd54eabc78370cb04d10becc0de1d6b", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000080) r8 = socket$inet(0x2, 0x3, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendmsg$inet(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x2, 0x4e26, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000200000001000000000000003800000000000000000000000700000083138be00000017f0000017f00000100000000831304ac141414000000c17f000001e0000002c4c10000000000000000000000000700000089171bffffffff735d252b9de0000001ac1414bbac141418ac141439892be8ac14142cac1414bb7f000001ac1414aaac1494aaac1414aaac1414bbe00000017f000001ffff"], 0xa5}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200066158, 0x1, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:49:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="cc0000001b00010027bd700000000000e000000100000000000000000000000000000000000000000000ffffe000000100"/64, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="160f560e75128f30b260", @ANYRESHEX], @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000088eb1154055482492b85720000000000000000000000000000003f0000000000000010000000000000000000"], 0x4}}, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000140)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x3}]}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000280)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7]}) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f0000000180)={0x7, 0x7, 0x2}, &(0x7f0000000240)=0x28) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 199.957014] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 199.986566] FAT-fs (loop1): bogus number of reserved sectors [ 199.993581] FAT-fs (loop1): Can't find a valid FAT filesystem [ 200.007650] audit: type=1400 audit(1585342149.085:50): avc: denied { node_bind } for pid=8088 comm="syz-executor.3" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 200.046055] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 20:49:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f00000004c0)) mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x206000, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) 20:49:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x40, 0x8001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=""/227, 0xe3}}, {{&(0x7f0000000d80)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=""/29, 0x1d}}, {{&(0x7f0000002e00)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000004f00)=""/101, 0x65}, 0xfffffffe}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6, 0x4000000000001ff}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./bus\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)={@ipv4={[0x0, 0x5, 0x4], [], @initdev}, 0x0, 0x0, 0x0, 0x2}, 0x20) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = creat(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/psched\x00') fchdir(0xffffffffffffffff) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="feb50495903d03ebb47fb78124745f994148dcf1d06912d1d1df271edff46666d39c025929f8f1b9b5c27382449b3b27f599954d56976c0f10a2db737f4bf69f4324717d6b2ad0216d3e6e2a1182cfa459023eaa07d4a1f6bb83e41fd14da838de8790caea7743bea8a21bb2273c1b228c43e94463"], 0x3, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) write(r4, &(0x7f0000000600)="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", 0xe00) sendfile(r4, r6, 0x0, 0x12000) socket(0x0, 0x0, 0x0) 20:49:09 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x4, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x80, 0x0, 0x0, 0xee01}, {0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x6}, 0x80000000, 0x0, 0x0, 0x1}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000280)={'veth1_virt_wifi\x00', 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4$llc(r3, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000200)=0x10, 0xc0800) openat$mice(0xffffffffffffff9c, &(0x7f0000000240)='/dev/input/mice\x00', 0x141000) r4 = dup(r0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r7 = dup(r0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000001380)={0x48, 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="0c630000016340400000008f580000000000000000000000000000000000000000000000000000000000000000000000000000551c56cc7101c300"/72], 0x1, 0x0, &(0x7f0000000040)="ef"}) 20:49:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = open(0x0, 0x0, 0x2) r1 = getpid() r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x9, 0x9, 0x0, 0xf7, 0x0, 0x200, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd2b, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x400, 0x6, 0x1, 0x1, 0x4, 0x521, 0x2}, r2, 0xb, r0, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x5, 0x0, 0xfffffffffffffffc}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = request_key(&(0x7f0000000180)='id_resolver\x00', 0x0, &(0x7f0000000240)='eth1!posix_acl_accessmd5sumwlan1md5sumvmnet0[\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r6}, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="23acb6329811af760a31d0bef4214b36130b06a9f243001c2b2b03dafe20377ac82613ea9fddcf5b1f4169ff8d63ea10ac13618f0e3db28e9051607dd87171f3af05a87caf46c324d41b8b333fd762cfebf0e8ad4069cee8ab154684272f0c3ead3b6469f99629ecddd54eabc78370cb04d10becc0de1d6b", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000080) r8 = socket$inet(0x2, 0x3, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendmsg$inet(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x2, 0x4e26, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000200000001000000000000003800000000000000000000000700000083138be00000017f0000017f00000100000000831304ac141414000000c17f000001e0000002c4c10000000000000000000000000700000089171bffffffff735d252b9de0000001ac1414bbac141418ac141439892be8ac14142cac1414bb7f000001ac1414aaac1494aaac1414aaac1414bbe00000017f000001ffff"], 0xa5}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200066158, 0x1, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 200.421964] audit: type=1400 audit(1585342149.605:51): avc: denied { set_context_mgr } for pid=8145 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 20:49:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = open(0x0, 0x0, 0x2) r1 = getpid() r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x9, 0x9, 0x0, 0xf7, 0x0, 0x200, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd2b, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x400, 0x6, 0x1, 0x1, 0x4, 0x521, 0x2}, r2, 0xb, r0, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x5, 0x0, 0xfffffffffffffffc}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = request_key(&(0x7f0000000180)='id_resolver\x00', 0x0, &(0x7f0000000240)='eth1!posix_acl_accessmd5sumwlan1md5sumvmnet0[\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r6}, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="23acb6329811af760a31d0bef4214b36130b06a9f243001c2b2b03dafe20377ac82613ea9fddcf5b1f4169ff8d63ea10ac13618f0e3db28e9051607dd87171f3af05a87caf46c324d41b8b333fd762cfebf0e8ad4069cee8ab154684272f0c3ead3b6469f99629ecddd54eabc78370cb04d10becc0de1d6b", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000080) r8 = socket$inet(0x2, 0x3, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendmsg$inet(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x2, 0x4e26, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000200000001000000000000003800000000000000000000000700000083138be00000017f0000017f00000100000000831304ac141414000000c17f000001e0000002c4c10000000000000000000000000700000089171bffffffff735d252b9de0000001ac1414bbac141418ac141439892be8ac14142cac1414bb7f000001ac1414aaac1494aaac1414aaac1414bbe00000017f000001ffff"], 0xa5}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200066158, 0x1, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 200.526962] binder: 8145:8147 ioctl 8912 400200 returned -22 20:49:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x40, 0x8001}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x1000, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=""/227, 0xe3}}, {{&(0x7f0000000d80)=@generic, 0x80, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=""/29, 0x1d}}, {{&(0x7f0000002e00)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, 0x0, 0x0, &(0x7f0000004f00)=""/101, 0x65}, 0xfffffffe}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$netlink(0x10, 0x3, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x6, 0x4000000000001ff}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f00000000c0)='./bus\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)={@ipv4={[0x0, 0x5, 0x4], [], @initdev}, 0x0, 0x0, 0x0, 0x2}, 0x20) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = creat(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/psched\x00') fchdir(0xffffffffffffffff) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYRESHEX=r5, @ANYBLOB="feb50495903d03ebb47fb78124745f994148dcf1d06912d1d1df271edff46666d39c025929f8f1b9b5c27382449b3b27f599954d56976c0f10a2db737f4bf69f4324717d6b2ad0216d3e6e2a1182cfa459023eaa07d4a1f6bb83e41fd14da838de8790caea7743bea8a21bb2273c1b228c43e94463"], 0x3, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2000, 0x0) write(r4, &(0x7f0000000600)="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", 0xe00) sendfile(r4, r6, 0x0, 0x12000) socket(0x0, 0x0, 0x0) [ 200.685780] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 200.714557] audit: type=1800 audit(1585342149.745:52): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16580 res=0 [ 200.751087] audit: type=1804 audit(1585342149.755:53): pid=8158 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir428701209/syzkaller.UjFhHG/10/file0" dev="sda1" ino=16580 res=1 [ 200.771220] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 20:49:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = open(0x0, 0x0, 0x2) r1 = getpid() r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x7}, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x9, 0x9, 0x0, 0xf7, 0x0, 0x200, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd2b, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x400, 0x6, 0x1, 0x1, 0x4, 0x521, 0x2}, r2, 0xb, r0, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x5, 0x0, 0xfffffffffffffffc}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r6 = request_key(&(0x7f0000000180)='id_resolver\x00', 0x0, &(0x7f0000000240)='eth1!posix_acl_accessmd5sumwlan1md5sumvmnet0[\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000340)={r6}, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000003c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="23acb6329811af760a31d0bef4214b36130b06a9f243001c2b2b03dafe20377ac82613ea9fddcf5b1f4169ff8d63ea10ac13618f0e3db28e9051607dd87171f3af05a87caf46c324d41b8b333fd762cfebf0e8ad4069cee8ab154684272f0c3ead3b6469f99629ecddd54eabc78370cb04d10becc0de1d6b", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x20004800}, 0x4000080) r8 = socket$inet(0x2, 0x3, 0x4) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000240)=0x7fe, 0x4) sendmsg$inet(r8, &(0x7f0000000380)={&(0x7f00000001c0)={0x2, 0x4e26, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1400000000000000000000000200000001000000000000003800000000000000000000000700000083138be00000017f0000017f00000100000000831304ac141414000000c17f000001e0000002c4c10000000000000000000000000700000089171bffffffff735d252b9de0000001ac1414bbac141418ac141439892be8ac14142cac1414bb7f000001ac1414aaac1494aaac1414aaac1414bbe00000017f000001ffff"], 0xa5}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200066158, 0x1, 0x0, 0x1, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 201.148365] audit: type=1800 audit(1585342150.155:54): pid=8184 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16583 res=0 [ 201.293693] audit: type=1804 audit(1585342150.165:55): pid=8184 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir428701209/syzkaller.UjFhHG/11/file0" dev="sda1" ino=16583 res=1 20:49:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@noacl='noacl'}]}) mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='9p\x00', 0x240440, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@sq={'sq', 0x3d, 0x8001}}, {@sq={'sq', 0x3d, 0x7}}, {@timeout={'timeout', 0x3d, 0x6}}, {@rq={'rq', 0x3d, 0xfff}}, {@common=@cache_fscache='cache=fscache'}], [{@subj_type={'subj_type', 0x3d, 'noacl'}}, {@dont_hash='dont_hash'}]}}) 20:49:10 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@decompose='decompose'}]}) 20:49:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="cc0000001b00010027bd700000000000e000000100000000000000000000000000000000000000000000ffffe000000100"/64, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="160f560e75128f30b260", @ANYRESHEX], @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000088eb1154055482492b85720000000000000000000000000000003f0000000000000010000000000000000000"], 0x4}}, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000140)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x3}]}) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000280)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7]}) getsockopt$IP_SET_OP_GET_BYINDEX(r3, 0x1, 0x53, &(0x7f0000000180)={0x7, 0x7, 0x2}, &(0x7f0000000240)=0x28) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 201.555973] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 201.555973] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 201.555973] 20:49:10 executing program 4: r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) setresuid(r4, r4, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="d212c61db7b439be"], 0x8, 0x0) 20:49:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x7b, 0x19ff, 0x0, 0x800}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x80, 0x2000000}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r3, r3) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)=""/246) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000540)=""/227, 0xe3, 0x2003, &(0x7f0000000640)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x4}, [@bcast, @bcast, @bcast, @null, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x48) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xb627, 0x0, "1a3a0e09056eb436"}) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f00000006c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000400)={{}, 'port1\x00'}) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x40006) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 201.602319] hfsplus: unable to find HFS+ superblock [ 201.608421] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 201.621048] EXT4-fs (loop1): Can't read superblock on 2nd try 20:49:10 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) unshare(0x4020000) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000040)={0xd000}) 20:49:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) [ 201.664139] hfsplus: unable to find HFS+ superblock [ 201.683628] EXT4-fs (loop1): Mount option "noacl" will be removed by 3.5 [ 201.683628] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 201.683628] [ 201.705160] EXT4-fs (loop1): mounting ext2 file system using the ext4 subsystem [ 201.713422] EXT4-fs (loop1): Can't read superblock on 2nd try 20:49:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x2ffe00) 20:49:11 executing program 5: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000300)={{0x3f, 0x99}, 'port0\x00', 0x1, 0x10021, 0xcc3b, 0x4, 0x81, 0x865, 0x3a1, 0x0, 0x2, 0x9}) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x6c8, 0x58) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x200) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x5) r2 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/access\x00', 0x2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000180)={0x1, 0x3, 0x1000, 0x53, &(0x7f0000000080)="ae27768eb53f387b65ae1b597fdf85798e48deb7c74eed783da85d0a02fc54e1f0119c6e40d15f303e268a909178c0406aa05e8cb4163b4275ab8605fca3c17588a4bb28af16d5bc328516e42e1b293cc6990e", 0x3c, 0x0, &(0x7f0000000140)="e32ca9e9b823e26784392e553a2dbff1607c3ac5ae1e262c7d847ce5590eefdc3257ab7f94e46cda22fa15ace5027a5c91ca59bdd44fb5c986d04d46"}) listen(r0, 0xfc0004) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f0000000240)) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x5, 0x2, 0x40}}, 0x30) recvmmsg(r3, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f00000002c0)) 20:49:11 executing program 2: socket$inet6(0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffffffff73cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getuid() openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40000, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdirerdir=.:file0,workdir=./file1']) r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/user\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000280)={0x401, 0x1000, 0x5, 0x6, 0x9eef, 0x92}) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) init_module(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') mount(0x0, &(0x7f00000001c0)='./file0/f.le.\x00', &(0x7f0000000200)='coda\x00', 0x22011, &(0x7f0000000240)='GPL$\x00') r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000000c0)) [ 201.855854] overlayfs: unrecognized mount option "upperdirerdir=.:file0" or missing value 20:49:11 executing program 2: r0 = socket$kcm(0x11, 0x8000000002, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0100000000f1ffff136c3ceba9000100627269646700000000000280"], 0x34}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f0000000040)=@ll={0x11, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x80, 0x0}, 0x0) 20:49:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getuid() ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004000}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x2}, [], {0x4, 0x5}, [{}, {}, {0x8, 0x3}, {}, {0x8, 0x4}], {}, {0x20, 0x4}}, 0x4c, 0x2) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r0) socket(0x0, 0x0, 0x1f) process_vm_writev(0x0, &(0x7f0000000200)=[{&(0x7f00000021c0)=""/4086, 0xff6}, {&(0x7f0000000600)=""/236, 0xec}], 0x2, &(0x7f0000000940), 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000180)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 20:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56e2c652ace184e, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ocfs2_dlmfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX], 0x2e) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) [ 201.914639] overlayfs: unrecognized mount option "upperdirerdir=.:file0" or missing value [ 202.079278] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:49:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) [ 202.121120] audit: type=1400 audit(1585342151.315:56): avc: denied { associate } for pid=8262 comm="syz-executor.0" name="bus" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 202.191998] o2cb: This node has not been configured. [ 202.198484] o2cb: Cluster check failed. Fix errors before retrying. [ 202.212432] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:49:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x109000, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$x25(r2, 0x0, &(0x7f0000000140), 0x80800) r4 = dup(r3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x3b}, @dev={0xac, 0x14, 0x14, 0x2a}, @local}, 0xc) [ 202.258264] (syz-executor.0,8265,0):user_dlm_register:681 ERROR: status = -22 [ 202.277872] overlayfs: filesystem on './file0' not supported as upperdir 20:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56e2c652ace184e, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ocfs2_dlmfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX], 0x2e) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) [ 202.343420] (syz-executor.0,8265,0):dlmfs_mkdir:497 ERROR: Error -22 could not register domain "file0" 20:49:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket(0x10, 0x803, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(r2, &(0x7f0000001280), 0x12) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000001240), &(0x7f00000012c0)=0x4) fcntl$dupfd(r0, 0x0, r1) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x64}, 0x1, 0x0, 0x0, 0x4008000}, 0x20040000) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000001200)={0x7, 'syzkaller0\x00', {0x4}, 0x7fff}) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="6c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="6535060005000000380012800b00010067726574637000001a00028008000600e00000010473ce0006000f00670e000006001800000400004e2100000a000500f2ff020200"/80, @ANYRES32=r4, @ANYBLOB], 0x5}}, 0x0) 20:49:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f00000003c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000440)=""/128, 0x80}, {&(0x7f00000004c0)=""/103, 0x67}, {&(0x7f00000000c0)=""/12, 0xc}, {0x0}, {0x0}], 0x5}, 0xc14b}, {{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000c40)=""/81, 0x51}, {0x0}, {0x0}, {&(0x7f0000000dc0)=""/209, 0xd1}, {&(0x7f0000000ec0)=""/144, 0x90}], 0x5, &(0x7f0000000340)=""/45, 0x2d}, 0x3f}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/220, 0xdc}, {0x0}], 0x3}, 0x8}, {{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/49, 0x31}], 0x1, &(0x7f0000010040)=""/102400, 0x19000}}, {{&(0x7f0000001600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001680)=""/96, 0x60}, {0x0}, {&(0x7f0000002880)=""/200, 0xc8}, {0x0}], 0x4}, 0x5}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000540)="fafca8065321a6c5ef0ebd238baa3455def50114c5a14249b76358e8265b6b9210becd65ece15d030da9a1fe489357fc279220ff1e15c6eed97be9f15eb8745d585e7853f038d581e100a37f5c70af7df20371f2279f4bfc59a3d189e4c307982d29ee63efd95cf17a755918bee9d35d429c94833c71f03b214a5916673ad9c7f738cce1ab1578ac81336f0888cd878378afb2b26177e5a119f310a4e73c11690b1d0bf6fd3fc3c92413fe5a9cb9ae218e41e99668138192bdaf797f4fbc5590930fc4617fd598e7ed97259d3bdc40c16450d8bca9783cfab01d514c6020bca08dbd44cc7d07c4ac6cb14ea45c4643b73c2a64132de7", 0xf6}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8400fffffffa) creat(&(0x7f0000000040)='./bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x2) 20:49:11 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', @ifru_flags}) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x109000, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$x25(r2, 0x0, &(0x7f0000000140), 0x80800) r4 = dup(r3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x3b}, @dev={0xac, 0x14, 0x14, 0x2a}, @local}, 0xc) 20:49:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x2ffe00) 20:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x800000000077, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000007c0)='./file0/f.le.\x00') 20:49:11 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000380)={0x38, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0) prlimit64(r0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x74782d441c5f7063) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000000700)=[{{&(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/187, 0xbb}], 0x1}, 0x1ff}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb, 0x0, 0x0, 0x4}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) 20:49:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) 20:49:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x89) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000200)=0x2) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000380)={0x9, 0x8, 0x7ff, 0x4, 0x71, 0x7}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) fanotify_init(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) umount2(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xb) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0/file0/file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x1000000, &(0x7f0000000280)='-{\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 202.762521] audit: type=1804 audit(1585342151.955:57): pid=8317 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir929911408/syzkaller.HfVN3A/14/bus" dev="sda1" ino=16581 res=1 20:49:12 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='.\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)={[{@utf8no='utf8=0'}]}) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000040)={0x1, 'macvlan1\x00'}) 20:49:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) r4 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x107, 0x12, &(0x7f00000000c0)=r4, 0x4) 20:49:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x89) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000200)=0x2) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000380)={0x9, 0x8, 0x7ff, 0x4, 0x71, 0x7}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) fanotify_init(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) umount2(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xb) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0/file0/file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x1000000, &(0x7f0000000280)='-{\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) 20:49:12 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0x200000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) r2 = dup(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x8) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1407, 0x100, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x51}, 0x80480d4) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r4, r0, 0x0, 0x100000d5d) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000280)={0x9, 0x0, 0x4, 0x4, 0x200, {}, {0x0, 0x0, 0x2, 0xf9, 0x8, 0x2, "ee5835c0"}, 0x5, 0x1, @fd, 0x5, 0x0, r7}) 20:49:12 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x2ffe00) [ 203.378020] FAT-fs (loop3): bogus number of reserved sectors [ 203.418113] FAT-fs (loop3): Can't find a valid FAT filesystem [ 203.460779] audit: type=1804 audit(1585342151.995:58): pid=8319 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir929911408/syzkaller.HfVN3A/14/bus" dev="sda1" ino=16581 res=1 20:49:12 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$cifs(&(0x7f0000000000)='cifs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)='tmpfs\x00') r0 = socket$inet(0x2, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x105084) sendfile(r0, r1, 0x0, 0x102000004) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) lstat(0x0, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x2afd, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000200)={0x1, 0x5, 0x8, 0x58da2c07}, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x67}}, 0x10) 20:49:12 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xe99}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0xff3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000300)=0xc) ptrace$cont(0x1f, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) setreuid(0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setreuid(0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) 20:49:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x89) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000200)=0x2) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000380)={0x9, 0x8, 0x7ff, 0x4, 0x71, 0x7}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) fanotify_init(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) umount2(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xb) mount(&(0x7f0000000100)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0/file0/file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x1000000, &(0x7f0000000280)='-{\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) [ 203.650353] FAT-fs (loop3): bogus number of reserved sectors [ 203.656238] FAT-fs (loop3): Can't find a valid FAT filesystem 20:49:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) 20:49:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x7}, 0x9000, 0x0, 0x8, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x178) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000400)=[{{&(0x7f00000000c0)=@caif, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)="a97164673dbdd71bdc180f3e0e66add18a21da7d3af01810cea017379a675acf6862206add2823900c578c395fda5af9889e6257c6ef6e1b080eccc2b3e2095826472a7cb69a24a215f694dfc07eb6dddbb4499ffc8997eecaa12d963137fb5d31223af356cb35383216e5da6235c5b1a4d55a7b409324d4faedf8dab854b32b945b7fedba3dd5bdfc9e32a9f8", 0x8d}, {&(0x7f0000000240)="9e1e56767c8cb9ac0ee16be8ca230babd934b639de4e59b91f101efe6f5ec6794286a7ec43265a34902cb12d3aa4437f5be4c761c3be5378a517feee0c81ecea55772a70a416658c767468fd1a376a09099a2713fa1f069708270915f7d7286605e4e696cdf126241f96a2185fff37d6bad8409a6d7da320efb66e31149717490249553e4981d6ecd32755ba780636467f6e0fc09b72e246fee06f8b2ff4617985cc56956ddda54a1e6cd0cb3d943bf22aaae129a303171d26014ee2405481e684532cf1a6e684ef9a1925abd76f2a3f6661047221e91129126f27ee", 0xdc}, {&(0x7f00000004c0)="7548598d5a639808bd11f6dc3eaafc2be5197fc89f38ea4941ae6b31cb139c3a5ea1cbb0d614936812465125b3395348e6b63fedcfbd0a31114c8d548fe644ebf371ab640008cc79ce637a41f628b45209dc9d8b30d907049e88ab5dce92765a5b9e8ab1200ac7722258ca183224b001f4dd11c791c01f62da9afeb9e9d52cf155ec1a8257ce08a8ac7d77fbde1a40d12568419478c8d71d5850c3f625c53a868e83aeccf0ed9c0c1851f1a0eaf7478046046d46e837d29bc6b1d999ee16e28ffc4f87e1b1f76e6be145b9ca85b66f7f81421385ca8ed85db445ca6f1131d34026fcfa609893594b4a510383", 0xec}], 0x3, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}], 0x1, 0x40) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000005c0)={0x0, 0x2710}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) socket(0x0, 0x406, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r2}) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0xff, 0x7ff}, 0x10) [ 204.013559] audit: type=1400 audit(1585342153.205:59): avc: denied { name_connect } for pid=8369 comm="syz-executor.3" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 20:49:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000280)="c3c70d2abf402bec0d7cd988adfb2b45f61f6fa6b7a5b296e265a368ca7673d7237cfa599a15753400795f2cd08189885cc314a17c927e7e92054e097dc2293ed0645ced"}, 0x20) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) lseek(r2, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @raw_data=[0x8, 0x200, 0xa110, 0x2, 0x7c, 0x100, 0xffff0000, 0xffff, 0xf5cb, 0x6, 0x8190, 0x7f, 0x0, 0x0, 0xbda7, 0x1ff, 0x8, 0x6, 0xcc5, 0x8, 0x10001, 0x1000, 0x7, 0x6, 0x5, 0xfffffffb, 0x6, 0xfffffffe, 0x80000001, 0x4, 0x0, 0x7]}) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r2, 0x100000003, 0x0, 0x28120001) 20:49:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) socket$kcm(0x11, 0x200000000000002, 0x300) 20:49:13 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x7}, 0x9000, 0x0, 0x8, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x178) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000400)=[{{&(0x7f00000000c0)=@caif, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)="a97164673dbdd71bdc180f3e0e66add18a21da7d3af01810cea017379a675acf6862206add2823900c578c395fda5af9889e6257c6ef6e1b080eccc2b3e2095826472a7cb69a24a215f694dfc07eb6dddbb4499ffc8997eecaa12d963137fb5d31223af356cb35383216e5da6235c5b1a4d55a7b409324d4faedf8dab854b32b945b7fedba3dd5bdfc9e32a9f8", 0x8d}, {&(0x7f0000000240)="9e1e56767c8cb9ac0ee16be8ca230babd934b639de4e59b91f101efe6f5ec6794286a7ec43265a34902cb12d3aa4437f5be4c761c3be5378a517feee0c81ecea55772a70a416658c767468fd1a376a09099a2713fa1f069708270915f7d7286605e4e696cdf126241f96a2185fff37d6bad8409a6d7da320efb66e31149717490249553e4981d6ecd32755ba780636467f6e0fc09b72e246fee06f8b2ff4617985cc56956ddda54a1e6cd0cb3d943bf22aaae129a303171d26014ee2405481e684532cf1a6e684ef9a1925abd76f2a3f6661047221e91129126f27ee", 0xdc}, {&(0x7f00000004c0)="7548598d5a639808bd11f6dc3eaafc2be5197fc89f38ea4941ae6b31cb139c3a5ea1cbb0d614936812465125b3395348e6b63fedcfbd0a31114c8d548fe644ebf371ab640008cc79ce637a41f628b45209dc9d8b30d907049e88ab5dce92765a5b9e8ab1200ac7722258ca183224b001f4dd11c791c01f62da9afeb9e9d52cf155ec1a8257ce08a8ac7d77fbde1a40d12568419478c8d71d5850c3f625c53a868e83aeccf0ed9c0c1851f1a0eaf7478046046d46e837d29bc6b1d999ee16e28ffc4f87e1b1f76e6be145b9ca85b66f7f81421385ca8ed85db445ca6f1131d34026fcfa609893594b4a510383", 0xec}], 0x3, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}], 0x1, 0x40) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000005c0)={0x0, 0x2710}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) socket(0x0, 0x406, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r2}) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0xff, 0x7ff}, 0x10) [ 204.226018] CIFS VFS: Malformed UNC in devname. 20:49:13 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x7}, 0x9000, 0x0, 0x8, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x178) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000400)=[{{&(0x7f00000000c0)=@caif, 0x80, &(0x7f0000000380)=[{&(0x7f0000000180)="a97164673dbdd71bdc180f3e0e66add18a21da7d3af01810cea017379a675acf6862206add2823900c578c395fda5af9889e6257c6ef6e1b080eccc2b3e2095826472a7cb69a24a215f694dfc07eb6dddbb4499ffc8997eecaa12d963137fb5d31223af356cb35383216e5da6235c5b1a4d55a7b409324d4faedf8dab854b32b945b7fedba3dd5bdfc9e32a9f8", 0x8d}, {&(0x7f0000000240)="9e1e56767c8cb9ac0ee16be8ca230babd934b639de4e59b91f101efe6f5ec6794286a7ec43265a34902cb12d3aa4437f5be4c761c3be5378a517feee0c81ecea55772a70a416658c767468fd1a376a09099a2713fa1f069708270915f7d7286605e4e696cdf126241f96a2185fff37d6bad8409a6d7da320efb66e31149717490249553e4981d6ecd32755ba780636467f6e0fc09b72e246fee06f8b2ff4617985cc56956ddda54a1e6cd0cb3d943bf22aaae129a303171d26014ee2405481e684532cf1a6e684ef9a1925abd76f2a3f6661047221e91129126f27ee", 0xdc}, {&(0x7f00000004c0)="7548598d5a639808bd11f6dc3eaafc2be5197fc89f38ea4941ae6b31cb139c3a5ea1cbb0d614936812465125b3395348e6b63fedcfbd0a31114c8d548fe644ebf371ab640008cc79ce637a41f628b45209dc9d8b30d907049e88ab5dce92765a5b9e8ab1200ac7722258ca183224b001f4dd11c791c01f62da9afeb9e9d52cf155ec1a8257ce08a8ac7d77fbde1a40d12568419478c8d71d5850c3f625c53a868e83aeccf0ed9c0c1851f1a0eaf7478046046d46e837d29bc6b1d999ee16e28ffc4f87e1b1f76e6be145b9ca85b66f7f81421385ca8ed85db445ca6f1131d34026fcfa609893594b4a510383", 0xec}], 0x3, &(0x7f00000003c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}], 0x1, 0x40) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000005c0)={0x0, 0x2710}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) socket(0x0, 0x406, 0x3f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000080)={r2}) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0xff, 0x7ff}, 0x10) [ 204.391144] CIFS VFS: Malformed UNC in devname. 20:49:13 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$cifs(&(0x7f0000000000)='cifs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)='tmpfs\x00') r0 = socket$inet(0x2, 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x105084) sendfile(r0, r1, 0x0, 0x102000004) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) lstat(0x0, 0x0) r2 = dup(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x2afd, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x5}, 0x0, 0x0, &(0x7f0000000200)={0x1, 0x5, 0x8, 0x58da2c07}, &(0x7f0000000240)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x67}}, 0x10) 20:49:13 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x20040010) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0x2, 0xb1, 0x24, 0x8, 0x0, 0x0, 0x40000, 0x820d25bd44fea00f, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0xfffffffffffffffd, 0xc}, 0x0, 0x4b9, 0x10001, 0x3, 0x81, 0x0, 0x7f}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 20:49:13 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x2ffe00) 20:49:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 204.621540] CIFS VFS: Malformed UNC in devname. 20:49:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d5a4000000}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) clone(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000240)={[0x5, 0x6, 0x81, 0x20, 0x3, 0x7fffffff, 0x5, 0x6, 0x8, 0x3, 0x5, 0x0, 0x0, 0x6f, 0xff, 0x7, 0x27c8, 0x2, 0x5, 0x6, 0xc7a7, 0x40, 0x7478, 0x0, 0xf3c, 0x1, 0x9, 0x783, 0x81, 0x7, 0x1ff, 0x5, 0xde, 0xfffffff8, 0xfeb3, 0x2, 0x20, 0x9, 0x1, 0x1, 0xffffffe1, 0xfff, 0x3, 0x0, 0x3708, 0x7, 0x7, 0x7fff, 0x20, 0xb711070, 0x9, 0x401, 0x6, 0xfffff000, 0x7, 0x0, 0x5, 0x4, 0x3, 0x225, 0xc9, 0x7ff, 0x200, 0xc4, 0x200, 0x1, 0x6, 0x1ff, 0x800, 0x0, 0x1ff, 0x2, 0x20, 0x8, 0xe8, 0x57e5, 0x81, 0x20, 0xfff, 0x5, 0x8, 0x80000000, 0x80000000, 0xbc2, 0x101, 0x17, 0x2, 0x1000, 0x81, 0x9, 0x2, 0x5, 0x80000001, 0x8000, 0x0, 0xffffa7b9, 0x0, 0xfffff801, 0x0, 0x2f3a, 0x0, 0xb2, 0x4, 0x6, 0x4, 0x5, 0x2, 0x1, 0x34, 0xff, 0x80, 0x8, 0x7fff, 0x2800, 0x1, 0x1, 0x80000001, 0x8, 0x4cb2, 0x5, 0xfffffffd, 0xe0, 0xffff, 0x7ff, 0x4, 0x80000000, 0x40, 0x9, 0xa2400000, 0x3, 0x10000, 0x7, 0x2, 0x7ff, 0x1, 0x3, 0x400, 0x8, 0x6, 0x10001, 0x6, 0x4, 0x5, 0x5, 0x0, 0xb517, 0x2, 0x5, 0x7f, 0x1, 0x3e, 0x5, 0x9, 0x4, 0x400, 0x1, 0x8, 0x2, 0x351, 0x6b, 0x200, 0x1, 0x28, 0x3f, 0x4, 0xfffffff8, 0x2, 0x20, 0x7, 0xffffffff, 0x3, 0x9, 0xffff8001, 0x6, 0x200, 0x4, 0x3, 0x6, 0xffffbc90, 0x0, 0xffffb05a, 0x1, 0x8, 0x9, 0x8, 0x1, 0x7346, 0x4, 0x5, 0x6, 0x4a5, 0x6, 0x68d6, 0x6, 0xffffff81, 0xa65, 0x8, 0x8000, 0x7, 0x4c3a, 0x5, 0x8, 0x5, 0x401, 0x0, 0x5, 0x8, 0x0, 0x8, 0x87, 0x79e, 0x0, 0x1, 0x4, 0x8000, 0x5, 0x5, 0x1, 0x6, 0x77, 0x8, 0x3, 0x40, 0x9, 0x6, 0x3, 0x6, 0x3, 0x1, 0xfff, 0x4, 0x1, 0x3, 0x7fffffff, 0xfffffff8, 0xffff0000, 0x0, 0x100, 0xbd44, 0x9, 0x4, 0x9, 0x4, 0x16a3a021, 0x8, 0xd2, 0x33, 0xd0, 0xfba0, 0xce16, 0x9, 0x1, 0x6, 0x10001, 0x7f, 0xcf, 0xfffffc00, 0x3, 0x7fff, 0x6d8, 0x8, 0x80, 0xfffffff7, 0x4, 0x1f85afd2, 0x20, 0x2, 0x40, 0x22ce91ab, 0x2, 0x10000, 0xffff0000, 0x9, 0x1, 0x8, 0xfffffff9, 0x10000, 0x6, 0x3, 0xb2f, 0x8001, 0x6, 0xba6, 0x2, 0x5, 0x9, 0x0, 0x3, 0xffffffff, 0x529b, 0x2, 0x7fffffff, 0x400, 0x7, 0xffff, 0x9, 0x9, 0x6, 0x9, 0x5, 0x641, 0x5, 0x0, 0x9, 0x80, 0x0, 0x9, 0x2, 0xc174, 0x8, 0x7, 0x8, 0x29, 0x3, 0xfffffffa, 0x4, 0x9, 0x40, 0xf0c, 0x10001, 0x7, 0xea9, 0xff18, 0x1, 0x6, 0x0, 0x2, 0x0, 0x7, 0x0, 0xf5f, 0x7fff, 0x1, 0x8001, 0x3, 0xc723, 0x8, 0x7, 0x8, 0x80, 0x1f, 0x401, 0x189, 0x0, 0x0, 0x2, 0x8, 0x3, 0x8, 0x0, 0xffffffff, 0x1, 0xffffffff, 0x10001, 0x1, 0xfff, 0x20, 0x8, 0x5, 0x2, 0x0, 0x5d96, 0x1, 0x38, 0x8, 0x7d, 0x0, 0x20877f2b, 0xdba, 0x2, 0x4, 0x5, 0x0, 0x8, 0x0, 0x8001, 0x9, 0x4, 0xffffffff, 0x7, 0x0, 0x8, 0x20, 0x800, 0xe3aa, 0x6, 0x80000001, 0x2, 0x3ff, 0x2, 0x5, 0x8, 0x8, 0xffff, 0x1, 0x400, 0x7, 0x96c, 0x1, 0x9, 0x100, 0x5, 0x200, 0x8, 0x100000, 0xe0ff, 0x20, 0x7, 0x10000, 0x9, 0x80000001, 0x4, 0x2, 0x8c7, 0x240, 0x7, 0x7, 0x3ff, 0x3, 0x9, 0x9, 0x100, 0x5, 0xaf, 0x34, 0x1ff, 0x5e, 0x7fffffff, 0x7e5d6c26, 0xa009, 0x2, 0x101, 0x1, 0xf3, 0x3, 0x9, 0x80000000, 0x8f88f09, 0xed, 0x8, 0xffffffff, 0x3f, 0x3ff, 0x3, 0x5a98, 0x800, 0xfff, 0x5, 0x9, 0x200, 0xc9, 0x1ff, 0xfff, 0x2, 0xfffffd09, 0x19a, 0xae, 0x7f, 0xa5, 0x400000, 0x4, 0x9, 0x5a, 0x40, 0xfffffff8, 0x0, 0x3, 0x8001, 0x1, 0x2, 0x400, 0x4, 0x1, 0x6, 0x9, 0x6, 0x1, 0x20, 0xff, 0x8, 0x7f, 0x9, 0x5, 0x88d, 0x1f, 0x4, 0x3, 0x0, 0x40, 0x7f93, 0xfffffc01, 0x12000, 0xfffffffb, 0x4, 0x8001, 0x0, 0x0, 0x8, 0x8c, 0x10000, 0x4, 0x5, 0x3, 0x4, 0x5, 0x5, 0x87c2, 0x3, 0x379, 0x400, 0x4, 0xe3a1, 0x2, 0x2, 0x9, 0x9f, 0x2, 0xa4, 0x3ff, 0x0, 0x9, 0x400, 0xbd, 0x8, 0x2, 0xf76, 0x9, 0x8, 0x4b60d710, 0x7f, 0x1, 0x1, 0x700000, 0x8, 0x1, 0x2, 0x85, 0x1ff, 0x8000, 0x8, 0x5a8f, 0x5, 0x5, 0xa321, 0x40, 0x0, 0x25137b36, 0x3, 0x8001, 0x5, 0x3, 0x6, 0x101, 0x0, 0x9, 0x7f, 0x6, 0x3c, 0x2, 0x4080, 0x40, 0x4, 0x7, 0x2, 0x7, 0xd1, 0x59d, 0x3, 0x4, 0x7, 0x8, 0x72b5, 0xfffffffe, 0x9, 0x1000, 0x1ff, 0x53ef, 0x80000001, 0x1f, 0x0, 0x6, 0xcbe, 0x0, 0x1, 0x40, 0x7ff, 0x2, 0xffffffff, 0x4, 0x3, 0x5, 0x9, 0xa9ce, 0xd59, 0x9, 0xffff, 0x2, 0x7, 0xfffffffe, 0x3ff, 0x6400000, 0x40, 0x1, 0x2, 0x0, 0x81, 0x41a, 0x300, 0xffffffff, 0xffffff7f, 0x4, 0x3, 0x7ff, 0x907c, 0x401, 0x7, 0x6, 0x200, 0x6, 0x3ff, 0x6, 0x401, 0x9, 0x80000001, 0xff, 0x1, 0x8, 0x1, 0x80, 0x4, 0x9, 0x7f, 0xad7e, 0x0, 0x2, 0x7, 0x10000, 0x0, 0x10000, 0x0, 0x6, 0x3, 0x8, 0x7, 0x6, 0x2, 0x9, 0x80000001, 0x4001, 0x7, 0x3, 0x0, 0x4, 0x6, 0x0, 0xffff8000, 0x3, 0x81, 0x1, 0xcf, 0x81, 0x8, 0xff, 0x200, 0xfffffe01, 0x7ff, 0x2, 0xffff, 0x4, 0x9, 0x2, 0x6, 0x0, 0x0, 0x0, 0x9e0, 0x100, 0x8, 0x80000001, 0x36, 0x2000000, 0x5, 0x8, 0x6, 0x1, 0x0, 0x54, 0x7fff, 0xfffffff9, 0xfff, 0x2, 0x7ff, 0x5, 0x800, 0x8, 0x5, 0x401, 0x7f, 0x0, 0x1ff, 0x229d, 0x100, 0x8001, 0x1, 0x0, 0x5, 0xfff, 0x8001, 0x6, 0x8, 0x1, 0x0, 0x7ff, 0x85, 0x7, 0x2, 0x2, 0x7, 0x2, 0x7, 0x7fffffff, 0x2e, 0xcd, 0x2, 0x9, 0x2, 0x8, 0xffff, 0x101, 0x3ff, 0x7, 0x0, 0x7, 0x4, 0x4, 0x4, 0x55b, 0xfffff000, 0x7ff, 0x800, 0x1, 0x7, 0x2, 0x69, 0x8d, 0x0, 0x80000000, 0x8126, 0x40, 0xfffffffd, 0x3000000, 0x0, 0x6, 0x3, 0x392e, 0x40, 0x800, 0x6, 0x5, 0x9, 0xfff, 0x3, 0x10000, 0x80000001, 0x8, 0x8, 0x1a954baf, 0x0, 0x9, 0x800, 0x4, 0x101, 0x742ad186, 0x10001, 0x1ff, 0x4, 0xe7a7, 0xffffff81, 0x2277, 0x0, 0x0, 0x40, 0x8001, 0x2, 0x5, 0x5, 0x4, 0x20000, 0x8000, 0x8, 0x7, 0xffffffbe, 0x1, 0x5, 0x9, 0xc8, 0xfffffffb, 0x5, 0x800, 0xffffffff, 0x9d, 0x2, 0x7fff, 0x800, 0x3, 0x0, 0x7, 0x9, 0xc3, 0x0, 0x40, 0x6, 0x5, 0x80000000, 0x3f, 0x1, 0x8, 0x1, 0x3f, 0x0, 0x0, 0x4, 0xfffffffc, 0x818, 0x80, 0x7, 0x7fff, 0x80000001, 0x89b, 0x80, 0x5, 0x0, 0x3, 0xec28, 0x80000000, 0xff, 0x401, 0x1, 0x3ff, 0x40, 0x5, 0x5a, 0x8, 0x7f, 0x0, 0xb56, 0x3ff, 0x0, 0x7, 0x101, 0x4, 0x81, 0x800, 0x2, 0x2, 0x1, 0x84, 0x9, 0xa2, 0x4, 0x7f, 0xfffffff7, 0x8000, 0x5, 0x1, 0x7, 0x7, 0x0, 0xde11, 0x6, 0x7f, 0x3ec00000, 0xe3cf, 0x40, 0x0, 0x7, 0x3f, 0x3, 0x1, 0x9, 0x64c3, 0x7f, 0x34, 0x3, 0x3, 0xfffffff8, 0x0, 0xfffffff8, 0x3f, 0x20, 0x9, 0x5, 0x8, 0x1864, 0x1, 0x7fffffff, 0x1, 0x2, 0x3d2, 0x5, 0x3ff, 0x80000000, 0x101, 0x6, 0x4, 0x80000000, 0x750, 0x7fff, 0xfff, 0x1, 0x3ff, 0x1000, 0xe6, 0x40, 0x62, 0x80000000, 0x64, 0x7, 0x39a, 0x5, 0x0, 0xfffffff8, 0xa, 0x8d, 0x7fff, 0x20, 0xbe, 0x401, 0x0, 0x7fff, 0x4, 0xd0, 0x7f, 0x3, 0x9, 0x0, 0x9, 0x0, 0x0, 0x7, 0x3, 0x1, 0x2, 0x6f, 0x9465, 0x8, 0x4, 0x0, 0x3, 0x10000, 0x1, 0x8000, 0x8, 0xfa, 0x81, 0x7, 0x3, 0x3, 0xfffffffc, 0x400, 0x6, 0x0, 0x9c1, 0xea8, 0x713d, 0x2, 0x345, 0x3, 0x30, 0x2, 0x5, 0x3, 0x1, 0x8, 0x8, 0x597, 0x10000, 0x1, 0x100, 0x9, 0xfb, 0xa123, 0x3, 0x71, 0x4, 0x8, 0x0, 0x3, 0x0, 0x8db, 0xff, 0x4, 0x800, 0x81, 0x1, 0x8, 0x401, 0x25161dc0, 0x9, 0x80, 0xdf, 0x2, 0x7, 0x6, 0x0, 0x81, 0x81, 0xb8, 0x9182, 0x3, 0x80000001, 0x1ff, 0xff, 0x3, 0x6, 0x4, 0x909, 0x400, 0x9, 0x1, 0xfff, 0x7fffffff, 0x5, 0xa7]}) 20:49:13 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) fstat(r8, &(0x7f0000000300)) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r5) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r10, 0x104, 0x7, &(0x7f00000001c0)=0x200, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24060004}, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:49:14 executing program 0: mkdirat(0xffffffffffffff9c, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r2) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xe99}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0xff3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b005b0010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000300)=0xc) ptrace$cont(0x1f, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) setreuid(0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x1b, 0x0, 0x1, 0x4, 0x6, @local}, 0x14) setreuid(0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(0x0, r5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) 20:49:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 204.814754] audit: type=1400 audit(1585342154.005:60): avc: denied { create } for pid=8431 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 204.912901] audit: type=1400 audit(1585342154.062:61): avc: denied { map } for pid=8431 comm="syz-executor.5" path="socket:[30370]" dev="sockfs" ino=30370 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 20:49:14 executing program 2: prlimit64(0x0, 0x3fff9783e8080915, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x100000000000}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000380)=ANY=[@ANYRES16], 0x2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYRES32=0x0], &(0x7f0000a8a000)=0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), 0x0) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000100)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000400)=""/230, 0xe6}, {&(0x7f0000000600)=""/204, 0xcc}], 0x2, &(0x7f0000000700)=""/238, 0xee}, 0x1) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:14 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) fstat(r8, &(0x7f0000000300)) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r5) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r10, 0x104, 0x7, &(0x7f00000001c0)=0x200, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24060004}, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:49:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) creat(&(0x7f0000000700)='./bus\x00', 0x0) 20:49:15 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x20040010) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0x2, 0xb1, 0x24, 0x8, 0x0, 0x0, 0x40000, 0x820d25bd44fea00f, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0xfffffffffffffffd, 0xc}, 0x0, 0x4b9, 0x10001, 0x3, 0x81, 0x0, 0x7f}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 20:49:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f00000001c0)=""/232, 0xe8, 0x10000, &(0x7f00000002c0)=@in6={0xa, 0x4e23, 0x285d527f, @loopback, 0x387}, 0x80) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x202, 0x0) mq_getsetattr(r1, &(0x7f0000000140)={0xff, 0x1, 0x7, 0x8}, &(0x7f0000000180)) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) 20:49:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:15 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) fstat(r8, &(0x7f0000000300)) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r5) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r10, 0x104, 0x7, &(0x7f00000001c0)=0x200, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24060004}, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:49:15 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) fstat(r8, &(0x7f0000000300)) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r5) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r10, 0x104, 0x7, &(0x7f00000001c0)=0x200, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24060004}, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:49:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) creat(&(0x7f0000000700)='./bus\x00', 0x0) 20:49:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) 20:49:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) sendfile(0xffffffffffffffff, r3, 0x0, 0x100000700) creat(&(0x7f0000000700)='./bus\x00', 0x0) 20:49:15 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r3, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r6 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'lblcr\x00'}, 0x2c) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) r7 = socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) fstat(r8, &(0x7f0000000300)) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$sock_inet_SIOCGIFPFLAGS(r6, 0x8935, &(0x7f00000003c0)={'veth1_to_team\x00', 0x9}) setsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000140)={r9, @remote, @loopback}, 0xc) ioctl$FICLONE(r3, 0x40049409, r5) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') r10 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r10, 0x104, 0x7, &(0x7f00000001c0)=0x200, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r9}) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24060004}, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 20:49:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:15 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:15 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0}, 0x20040010) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x3, 0x70, 0x2, 0xb1, 0x24, 0x8, 0x0, 0x0, 0x40000, 0x820d25bd44fea00f, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0xfffffffffffffffd, 0xc}, 0x0, 0x4b9, 0x10001, 0x3, 0x81, 0x0, 0x7f}) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 20:49:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x48280) fcntl$setstatus(r0, 0x4, 0x6100) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='n'], 0x1) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x28}, 0x87ffffc) 20:49:15 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) 20:49:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 206.852665] audit: type=1800 audit(1585342156.047:62): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=5 res=0 [ 206.919145] audit: type=1400 audit(1585342156.047:63): avc: denied { map } for pid=8542 comm="syz-executor.5" path="/root/syzkaller-testdir929911408/syzkaller.HfVN3A/21/file0/bus" dev="loop5" ino=5 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dosfs_t:s0 tclass=file permissive=1 [ 206.958827] audit: type=1800 audit(1585342156.047:64): pid=8556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="bus" dev="loop5" ino=5 res=0 20:49:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x40}, 0x0, 0x0, r1, 0x9) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)={0x9, 0x20000000001, "f2"}, 0x484801) 20:49:16 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) 20:49:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x401, @ipv4={[], [], @empty}, 0x4}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$urandom(0xffffffffffffff9c, 0x0, 0x200000, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) execve(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300), &(0x7f0000000380)=[&(0x7f0000000340)='root']) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)='9p\x00', 0x200008, &(0x7f0000000180)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x8}}, {@sq={'sq', 0x3d, 0x40}}, {@timeout={'timeout'}}, {@sq={'sq', 0x3d, 0x3ff}}, {@timeout={'timeout', 0x3d, 0x2}}, {@timeout={'timeout', 0x3d, 0x81}}, {@timeout={'timeout', 0x3d, 0x615}}, {@common=@access_uid={'access', 0x3d, r5}}, {@common=@cache_fscache='cache=fscache'}], [{@context={'context', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'root'}}, {@audit='audit'}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}}) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 20:49:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) 20:49:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="a4bca4dddf9ce544fb925d7db99eef2e1259ffac68c378518b29877a5130a61a3ed6dfa983e26a01eb010001000000000097ce4b0cef3a71de3e0553cd80fcfe397cb18b"], 0x44) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000140)=0x8) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:16 executing program 2: getpid() socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xe600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="fbff20", @ANYRES32=0x0], 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x400, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @ipv4={[], [], @loopback}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 207.656511] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 207.665282] FAT-fs (loop3): Filesystem has been set read-only [ 207.672524] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) 20:49:16 executing program 0: clone(0xd7e0ce5d0185091b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x230, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="126348400000000005630440000000000e630c40000000000000000000000092ba904f40000000000b63000010000f630c40000000000000000000000000006340400000000000000000000000000000000003630840450e398ccad1c9426289ad022b131cee9a7966b01ffa6c0bb2c08b26bcf3e05d0cef1e39e50ed4195a01e4f2f48909d6385f2bace2ad26431b8ad4ec0347ce332fe69bb773c0e7bacc3a21005bcf64acdbabfa394c5356c3d0ef2b70c97b0c0d60bc51cb423632d6facd4deab0323425de007131a3f987dc9ef4d503d11c67ca4800"/225, @ANYRES64=0x0], 0x1000001ed, 0x717000, 0x0}) 20:49:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:16 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_GET_XCRS(r6, 0x8188aea6, &(0x7f0000000240)={0x7, 0x3f, [{0xcbe7}, {0x4d, 0x0, 0x40}, {0x4, 0x0, 0x400000000000000}, {0x4, 0x0, 0x7f}, {0x100}, {0x8, 0x0, 0x2}, {0x2}]}) getsockname$packet(r4, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="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"], 0x34}}, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x80, 0x0) ioctl$DRM_IOCTL_RM_MAP(r9, 0x4028641b, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, 0x3, 0x4, 0x18, &(0x7f0000ffa000/0x3000)=nil, 0x3}) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32=r7, @ANYBLOB="030000cd56d0b35cc881ba9b0b00010023000000020000000000fcffffff00000000000000bcea00", @ANYRESHEX], 0x4}, 0x1, 0x0, 0x0, 0x4001}, 0x0) [ 207.826945] binder: 8613:8616 ioctl c0306201 20000080 returned -14 20:49:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x25, 0x28, 0x5, 0x9, 0x0, 0x1ff, 0x0, 0xa3, 0x1}}) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) open(&(0x7f0000000040)='./file0/bus\x00', 0x561a00, 0x42) pwrite64(r4, &(0x7f0000000180)="aa", 0xfdef, 0x2) [ 207.957994] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:49:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 208.009799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:49:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="a4bca4dddf9ce544fb925d7db99eef2e1259ffac68c378518b29877a5130a61a3ed6dfa983e26a01eb010001000000000097ce4b0cef3a71de3e0553cd80fcfe397cb18b"], 0x44) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000140)=0x8) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="a4bca4dddf9ce544fb925d7db99eef2e1259ffac68c378518b29877a5130a61a3ed6dfa983e26a01eb010001000000000097ce4b0cef3a71de3e0553cd80fcfe397cb18b"], 0x44) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000140)=0x8) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept(r1, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f00000001c0)=0x80) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x111, 0xffffffffffffffff, 0x59fb1000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="87645ab95355f4f43b13a1ffc569be0fae1a1d6ff6946f6e43dc3ca89da5929d47fdfd305a10462c30b8b20248ce9a8dfb4644bcd7ce43d6b44feb6c10d1ebcee4fe606fc4ba542de12f7cabdd82192f6561bf6631d9945545dfbdc865448ef10c48e7bb695f2c0ced786c7231704928d5e0f5e03eea296d81618fb65538d8fd2311cea0623591cd88b012818895a2df0ebab05321e462721953b5", @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000000000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="2c0096adabaa596e67314c49ddb8a664238efa8f32"]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x200020, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746d6f6465303030725f69643d00000000000000000000000000000000000000000000000000e7b51c1d12cc929955e3baee76f778094a626ad41fe4911cc3e3b2c102827148abf70e2f300b2a45896d763f94cad241998b0a3f84662d5a2edf4b06b62ea044cfeeee3078c9b345d53ad89a4f0734c7e471cb1b2a1e34e7a3c011120215b382e0fdae2629ee", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYPTR64], 0x8) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000002c0)) r6 = creat(0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x32) ioctl$EXT4_IOC_GROUP_ADD(r6, 0x40286608, 0x0) fallocate(r6, 0x0, 0x0, 0x1000100) 20:49:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="a4bca4dddf9ce544fb925d7db99eef2e1259ffac68c378518b29877a5130a61a3ed6dfa983e26a01eb010001000000000097ce4b0cef3a71de3e0553cd80fcfe397cb18b"], 0x44) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000140)=0x8) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:17 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="a4bca4dddf9ce544fb925d7db99eef2e1259ffac68c378518b29877a5130a61a3ed6dfa983e26a01eb010001000000000097ce4b0cef3a71de3e0553cd80fcfe397cb18b"], 0x44) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4040854, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={r6, 0x9}, &(0x7f0000000140)=0x8) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 20:49:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:18 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 209.955031] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 209.963535] FAT-fs (loop3): Filesystem has been set read-only [ 209.969786] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 970769) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000780)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x1f0, 0x98, 0x98, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x4, 0x0, {[{{@ip={@empty, @remote, 0x0, 0x0, 'bond_slave_1\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x7, 'kmp\x00', "6243baa189314a37cddf35c5f784922403af7dcd992b0bd0f16586e7645b9ea41a3a6a8a6c25700379613822d5636e7435fdef8d539b06c2f652ef39e9167d6a835199e4781bb9546702897566c8591d6db1c5cbaa66724340e2fbfa8d44c5f262f06ded5130c39e598fe08914b4f6df4d777ae7268c29ef693f612891c6956d", 0x55}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb46}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x541c, &(0x7f0000000080)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:19 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 210.599723] ip_tables: iptables: counters copy to user failed while replacing table [ 210.852218] ip_tables: iptables: counters copy to user failed while replacing table 20:49:20 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x6, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x27dd932f, 0x0}}], 0xc6, 0x4040000) 20:49:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000780)=@filter={'filter\x00', 0xe, 0x4, 0x358, 0x0, 0x0, 0x1f0, 0x98, 0x98, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x4, 0x0, {[{{@ip={@empty, @remote, 0x0, 0x0, 'bond_slave_1\x00', 'veth0_to_bridge\x00'}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x7, 'kmp\x00', "6243baa189314a37cddf35c5f784922403af7dcd992b0bd0f16586e7645b9ea41a3a6a8a6c25700379613822d5636e7435fdef8d539b06c2f652ef39e9167d6a835199e4781bb9546702897566c8591d6db1c5cbaa66724340e2fbfa8d44c5f262f06ded5130c39e598fe08914b4f6df4d777ae7268c29ef693f612891c6956d", 0x55}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb46}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x541c, &(0x7f0000000080)) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 20:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) [ 211.052860] ip_tables: iptables: counters copy to user failed while replacing table 20:49:20 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c000200050007000500000011d9165fe35cf75e5adcafc537684466a96e0a317fc47ff9ed949d8a82743f4012689ebb70da8c5a"], 0x3c}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x4, 0x6, 0x3a2ec996f5e4817f, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8080}, 0x8a77c2bf66dcadf8) 20:49:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1802, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x1ff) socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e1d, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r2, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="5bce08000000000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001000000"]}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f00000000c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)={0xb0, 0x0, 0x0, 0x0, 0x0, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r6 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r6, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r5, r6, 0x0, 0x20000102000007) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x100, 0xee) dup2(r7, r1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) close(r8) open(0x0, 0x7f05f079d1ef35dc, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x6) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r9, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(0xffffffffffffffff, 0xc01064b3, &(0x7f0000000180)={r10}) 20:49:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff8b}, 0x48) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:20 executing program 3: syz_open_dev$ndb(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x81}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c000200050007000500000011d9165fe35cf75e5adcafc537684466a96e0a317fc47ff9ed949d8a82743f4012689ebb70da8c5a"], 0x3c}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_FLUSH(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x4, 0x6, 0x3a2ec996f5e4817f, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8080}, 0x8a77c2bf66dcadf8) 20:49:20 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$packet_int(r8, 0x107, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="14"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 20:49:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 20:49:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:20 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:20 executing program 3: timerfd_create(0x2, 0x0) request_key(&(0x7f0000000000)='cifs.spnego\x00', 0x0, &(0x7f0000000340)='cpuset@\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x418, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./bus\x00', 0x970ba90543d1828e) open(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x101000, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) creat(0x0, 0x0) io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46800) creat(0x0, 0x40) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) r1 = open$dir(0x0, 0x48ec82, 0x6e2ab457e7a81bb2) mkdirat(r1, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4e0940, 0x0) renameat(r1, &(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000240), 0x3c) open$dir(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r3, 0x29, 0x36, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r4, 0x29, 0x8, &(0x7f0000000100)=0x1, 0x4) mmap(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) prctl$PR_GET_KEEPCAPS(0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) fdatasync(0xffffffffffffffff) ftruncate(r5, 0x7fff) sendfile(r4, r5, 0x0, 0x8000fffffffe) [ 211.594012] audit: type=1400 audit(1585342160.787:65): avc: denied { write } for pid=8829 comm="syz-executor.0" path="socket:[33234]" dev="sockfs" ino=33234 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$vhci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="032234712fc375190223af099a72b1fbb33273fa73883a445da87eb93fbbad8cd00d00f7e45ee0d9c4e09869c3a3f3844928b65356da95dfd92d3c7b0c21463c63a1d7ee5c6aafe896f9c267682ba2971a315f272705dab48be3cdf53b4723fa7d0237d1ba99e0e2e8d478ea7d7a42b1abb7e5d46cd86a30b5b10e69d2ed316fd7c256a082245ba97238"], 0x8a) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) r5 = socket$inet(0x10, 0x2, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x0, 0x2000000000000000}, {}, 0x0, 0x6e6bb4}}, [@policy_type={0xa}]}, 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x21) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$cont(0x1f, r7, 0x0, 0x0) ioctl$sock_FIOSETOWN(r6, 0x8901, &(0x7f0000000040)=r7) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x3) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000200)="24000000210007041dfffd946f610500020000e8fe0200000001080008000a000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0x11) 20:49:21 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x20}, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) splice(r0, &(0x7f0000000000)=0xfff, 0xffffffffffffffff, &(0x7f0000000140)=0x2, 0x6, 0x3) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000180)={0xffffffff, "88b98c0c1059208a262868c4c89543200d6af238a2357a38dedf6b0da27b8e3e", 0x2, 0x1}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UFFDIO_ZEROPAGE(r4, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000524000/0x3000)=nil, 0x3000}, 0x1, 0x6000000}) 20:49:21 executing program 3: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffffff8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x24040811) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000440)={0x800, [0x7ff, 0x2, 0x3], [{0xfff, 0x31d3, 0x1, 0x0, 0x1}, {0x8, 0x1, 0x1, 0x1, 0x1}, {0xe22, 0x6, 0x1, 0x1, 0x1}, {0x6, 0x5, 0x0, 0x0, 0x1}, {0x4, 0x80000000, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x800, 0x1, 0x1}, {0x4, 0x86ec, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x81b9, 0x1}, {0x8000, 0x2, 0x1, 0x0, 0x1, 0x1}, {0x8a, 0x7, 0x0, 0x1, 0x1}, {0x1, 0x2f900, 0x0, 0x1, 0x0, 0x1}, {0x3, 0xbd}], 0xe}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) flock(r2, 0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x1f) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:49:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0x18, 0x2, 0x1, 0x80b, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8020000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x3f9, 0x20, 0x70bd2b, 0x25dfdbfb, {0x1}, [""]}, 0x18}, 0x1, 0x0, 0x0, 0x8040}, 0x4008000) pipe(&(0x7f0000000180)) 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 212.024001] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 212.145904] device vxlan0 entered promiscuous mode 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:21 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SOUND_MIXER_READ_STEREODEVS(r0, 0x80044dfb, &(0x7f0000000040)) r2 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) sendmmsg$unix(r3, &(0x7f0000002a40)=[{&(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000000080)="9b6c77e789d48ce63a6f3a3967fb07481bab8e6eaa5cdfe73eb2cdc3faf20b7d9c7dc29eadb56d97f3be5aa1972755b6e9ff84bbcfc3", 0x36}, {&(0x7f00000001c0)="d5fa93a6184091e6fe4e49aa829bbc86034ae89ee416135dd73884368e212ce9e21a34e48964eb2688a191393bdd60426b26c31e882c4f17efc2f8bf61d3a9b1cc93c3b3dcbd56164c1942c53835b2004b80822c2f92b2d65f60cbf972f41ad8de2fe0eb608d23d2edf85417e4b188ab85b1d069008216aab0", 0x79}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="55b13a57144b5e17d8786cc8c51ca1c8501d32c994546b09e27b8584c5198ac2fe68cec2debc5151b5c150a07d458a8bbcce288f9de4a1fc362509eb970985dbe4dfa4c7b63e2d270bd69340f9acf85a6094b2bb55383d4130", 0x59}, {&(0x7f00000012c0)="d312b7d28979e3667943c6f465db85afa4b6c39396c423b8d215fb82b60baec3ef37fd363e6db9fd5bf81743407bfc28da5902aa15931a56f20bbbad55130b2615ab1d442fe73a049aa5b516fb8a3320e9", 0x51}, {&(0x7f0000001340)="eff2c4ac522645c63866bd07d435b9ed76ad143965c3ce8c5456bba09f1e24f12a504f01c50071cd845f514962578effcdd1a6a27842aac7d20b20700e5ed8cae5ab4fa68b6b68ff1f36ac085e1de39e54c79af29f1580ffa41d28a57394fe9e39b9fb69e1278bedda4f8522af6262e3e95240a597c971392294b896794bee168aac9930b71f304e926897402b7826b777a7c0d89dfb055148386142a4157ee06b5c5fdfff2ece3eeceb3ec07da807219a4bf63046cf892d850e8e0bed4d8010dd0dd72c06e573d73014f5f8b7c05b721f674546267cbb3ff46e57345e60ca036331", 0xe2}, {&(0x7f0000001440)="4f053e7196595cb46a510544b7cfff809f939455df82d0b746e8878d19fdbacb4683b620502a7a6c0f806b43bf0e21bef63d2e724e6df1bf8c72ca701d20c4ebe2138a67ac9549efd9213ce6037e940e85ee293742a4cbec8116eafacb81bca9dfdcdcd220b3086b07aed49cf7a44be2b321b5b69b394284e6a989996908bf02cd1ec794fd3ddb831cf6b73766854cc5319f4a3aef1d29bdc793772921e8ed58c30a03c6d4fc47921bcba638daa5910be42bf1f7662fac3ae763fa626b6e41fd29f540b70f623fa1396ed491a5b3742a5e45a7b658b403dc1e70583ecc148a85b2d86b", 0xe3}, {&(0x7f0000001540)="542478107f78accfb5e95836289880b5723e424c184148f7e32ac778f165fe59ee3de43bafe207f993ae1176111505d75208adc4b29af7722438bee0c326253055e26f197101718076fe923ae992a500ce3030a217306778e036ba78f43a21125c29bcc3b138291b7bbd0226540563d46fa2f18336cf005a70a0ca33443d4269b97609c546d234cf1b615ff5d86706409d52", 0x92}, {&(0x7f0000001600)="c761a4f672277a591c73a30e783ed32037ada36d82d159731e4f9eddf9a70e210786684a4d37ff23a98b397f804bc76149d0c46130038bdd0fe7450ba66ae6b151878130fc74e44a28a46e8dc91d86b7c2fd5d0e567e289a5ddfb5d6d4a0d7a88e8d0e959cb64b1ff63c7a64663f025aaa7f72ac54f7ebfaff61a10c9f138e9a2b12dc86d419a6c99130c1e1eb64fac4bf012094de3018c129c641fe03bc", 0x9e}], 0x9, 0x0, 0x0, 0x44000094}, {&(0x7f0000001780)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000029c0)=[{&(0x7f0000001800)="7ed89e875b71696afe879eb88f8ca3c27f76ad9e5cf2fa6d62915571bcf4bf26e21499ffcac34197ea5fbf89d9f4f7c8ed9f00db0f335e8923c01321ff5e915360d0ee9b61e51515299181acacd3502e5dd58262edaf56eca88964629beb09443e57728e50955bc01fb3998eb61be3f424851b77d03c6137654d5725019736c12cca8c6d400cdf5efdc2efb113553f83a9f6d363e41e2a9ae662e7f37473a71f21cabc60db7546bc989bbb38f2cb570e0f13dad4c63b00850f1465372bfab62b7c936cca6f5ffab2cffca933286bb9c775d1a3e86b000b9e2fc0dcfbc94e5f5d2f2e421dbdd470d0d18c06e2377291564bbfb7115606", 0xf6}, {&(0x7f0000001900)="b158a1736b680d2a121bad6bcc2d957065095595b3e2f8a24d8d88df929a01ebb3f9dcfbdca4e40a7659d866d5e35f6cbc7f9355f8a3a22edca8471041d4569dc2b2c8369da791bf60c33999eff784ae5415f69018cf92c5e147ed2e9ccea7bb2960b1dd4eea8095d6b5b91c65a4900dbae68e1e5e9c416d59d22f9076ea6124f3223c803951b3f57ef6bb4103809e79cf07cd2fc7de09f5fce6eecc36e546643d5f4295fdf306e44ded468b5e77460d89705f314894decdc5383f", 0xbb}, {&(0x7f00000019c0)="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", 0x1000}], 0x3, &(0x7f0000002a00)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r2, r4, r0]}}], 0x20, 0x4000000}], 0x2, 0x41) connect$ax25(r2, &(0x7f00000000c0)={{0x3, @netrom}, [@null={0x40, 0x40, 0x40, 0x40, 0x40, 0x40, 0x25dfdbfc}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote, @rose, @netrom, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:21 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x3000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="60a70000000000000800"/20, @ANYRES16, @ANYBLOB="bb0e0000000046583000d3d33ae60100766c616e000000002000028006000100000000000c0002000a0000000a0000000600050088a8000008000500", @ANYPTR, @ANYBLOB="a3b72278e9da2e4155854c459d3fceb475fca51852ce5c6382e686b84a32ec7c6506d6cf2f5943fd473f549ebcd017f29e23f4937985b926a084d28d58da3172605b41a53abd198e7afa23734297b7cf754a493f86054a5116", @ANYRES32, @ANYBLOB], 0x7}, 0x1, 0x0, 0x0, 0x8880}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 20:49:21 executing program 3: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffffff8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x24040811) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000440)={0x800, [0x7ff, 0x2, 0x3], [{0xfff, 0x31d3, 0x1, 0x0, 0x1}, {0x8, 0x1, 0x1, 0x1, 0x1}, {0xe22, 0x6, 0x1, 0x1, 0x1}, {0x6, 0x5, 0x0, 0x0, 0x1}, {0x4, 0x80000000, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x800, 0x1, 0x1}, {0x4, 0x86ec, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x81b9, 0x1}, {0x8000, 0x2, 0x1, 0x0, 0x1, 0x1}, {0x8a, 0x7, 0x0, 0x1, 0x1}, {0x1, 0x2f900, 0x0, 0x1, 0x0, 0x1}, {0x3, 0xbd}], 0xe}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) flock(r2, 0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x1f) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:49:21 executing program 2: r0 = socket$inet6(0xa, 0x80000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=""/167, 0xa7}, {&(0x7f0000000280)=""/128, 0x80}, {&(0x7f00000003c0)=""/218, 0xda}], 0x3}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000)=0x1f, 0x4) sendto$inet6(r0, &(0x7f0000000240)="109535192793d3423d43ce9b7283bcd7c9b2c4b154cbe4cb4c3408c3aa8a1e9a7dfd6d432649045f6df301", 0xfe02, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @remote}, 0x31) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xffe0) [ 212.243270] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 212.319747] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:21 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0x7fff, 0x800}, {0x1, 0x0, 0x800}, {0x4, 0x3f}, {0x4, 0xff, 0x800}], 0x4, &(0x7f0000000080)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000006c0), 0x1591, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) openat(0xffffffffffffffff, 0x0, 0x20c0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @empty}}, 0x1, 0x10, 0x0, 0x0, 0x21}, &(0x7f00000000c0)=0x9c) [ 212.389554] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de [ 212.400790] audit: type=1400 audit(1585342161.587:66): avc: denied { execstack } for pid=8912 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 [ 212.500580] device vxlan0 entered promiscuous mode 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:21 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x40, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8982, &(0x7f00000004c0)={0x6, 'ip6erspan0\x00', {0x7}, 0x40}) 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:21 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r7, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a3000500f4ff", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="15217f5590e8070021b90000", @ANYRES32=r7, @ANYBLOB="02000000ffffffff000000000a0001007273767036000000040002009ec2d0e7a7a987d761890c75a71e6b55840a3be1646c68cc19455e69015014d2fee79524c331a8575a17d7d1c5a9ce93ed0b105425be291f66c6c5f31275c6368931e867711cd65d54f305f23b0945f80fdbfef35f7f1ea8f0cedc0029d4ab9a50c11ec87b71f03b48571b0ac62102392c21b1e2543cb9ea4008188fdbf989f2bab5cf18d3bc0e92eacd7ca685db618175b1cfa11a869f456fb07e9db280a47ab3dd5810225be0432b33c27a96adcb61323b32b46127c55477584109dbc6c74e"], 0x34}}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@empty}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000340)=[@in6={0xa, 0x0, 0x0, @dev, 0xb}], 0x1c) 20:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:21 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 212.718308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59536 sclass=netlink_route_socket pig=8945 comm=syz-executor.5 20:49:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:22 executing program 3: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfffffff8}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x24040811) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000440)={0x800, [0x7ff, 0x2, 0x3], [{0xfff, 0x31d3, 0x1, 0x0, 0x1}, {0x8, 0x1, 0x1, 0x1, 0x1}, {0xe22, 0x6, 0x1, 0x1, 0x1}, {0x6, 0x5, 0x0, 0x0, 0x1}, {0x4, 0x80000000, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x800, 0x1, 0x1}, {0x4, 0x86ec, 0x0, 0x1, 0x1, 0x1}, {0x0, 0x81b9, 0x1}, {0x8000, 0x2, 0x1, 0x0, 0x1, 0x1}, {0x8a, 0x7, 0x0, 0x1, 0x1}, {0x1, 0x2f900, 0x0, 0x1, 0x0, 0x1}, {0x3, 0xbd}], 0xe}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c866a951362d3fa985503f8f45bfb4e9240b985dda11bde27881f17233d3ad01f2177b1a53e51397d581d1549a05c1955f5d2a27a54f154dfab0a4d6a66872083c18972c13e068508685eb082db85be8bcf0074dd91f31c0bc042060d00"/148, @ANYRES32, @ANYBLOB="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"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) flock(r2, 0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x1f) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 20:49:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 212.875391] syz-executor.3 (8914) used greatest stack depth: 24272 bytes left 20:49:22 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x40, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8982, &(0x7f00000004c0)={0x6, 'ip6erspan0\x00', {0x7}, 0x40}) [ 213.177312] device vxlan0 entered promiscuous mode 20:49:22 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semctl$SETALL(r0, 0x0, 0x11, 0x0) semtimedop(r0, &(0x7f0000000000)=[{0x4, 0x7fff, 0x800}, {0x1, 0x0, 0x800}, {0x4, 0x3f}, {0x4, 0xff, 0x800}], 0x4, &(0x7f0000000080)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x20, 0x0, 0x0, 0x800, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x200, 0x0) shutdown(r1, 0x0) recvmmsg(r1, &(0x7f00000006c0), 0x1591, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) openat(0xffffffffffffffff, 0x0, 0x20c0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={r3, @in={{0x2, 0x0, @empty}}, 0x1, 0x10, 0x0, 0x0, 0x21}, &(0x7f00000000c0)=0x9c) 20:49:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:22 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x40, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8982, &(0x7f00000004c0)={0x6, 'ip6erspan0\x00', {0x7}, 0x40}) [ 213.454926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59536 sclass=netlink_route_socket pig=8991 comm=syz-executor.5 20:49:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2511, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$packet(0x11, 0x0, 0x300) socket(0x28, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000400c2b30005026311be09712e000000", @ANYRES32=r3], 0x2}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='`\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) setsockopt$inet_dccp_buf(r2, 0x21, 0x0, &(0x7f00000002c0)="c9258a54ee421701e884633a977c2ca55c5c733e72138ec24c6a0852e5649790b0db2e8cb4b7a433bbda5d1ae3ca7a7f4a429f4ce158037ef9b8a5fa013b228341dc46ffa86f109332aac8ecc37a158e43d153f7e3fca5d6a2074c355b8832f543490829da930a748d86f145527a7ddf8f618fce803208ab8215900eece87b4f698880a2bff90b32", 0x88) 20:49:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:22 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x3, 0x22) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="02011800000001000000ff07000000fffffffd000800000000000000004000ffffff850000009237c30000000000f87b5be153380080000055aa4aefe94c4d0d31d59a7283420a0e09b1f524c17d31af462a06d2e8bf29fd8393a25c4d5557d85cf8a3f2486bb9e10c649854edfbcc751fc1c0bd328a37aaa283cf763e7f02579be6edc7aaa7e8a60428bc836925d700"/155, 0x9b, 0x1c0}, {&(0x7f0000000300)="9da2cd7400a32214aff07d017706aa7ebae9a68ac98ea3641c1dcc39ab44a5373c9bf7715d26db5637cd38f98087fcde777964505123eef91c623b46f66f8072603e42f0e092fd7512be0190bf4dca86667bb1e0941eb99fd5ab0de9503da3866b2a79e9f27a3d5e3d936f91390122a849856fc1bc5d6f36becc92b5ac87d920c6bbbfc10312c35820f1359fab70a0391ad4e9865b3a265a0164741a4feceb070f1ec286c0c26f69b149a820685804664fe29c0054c2d2f6c97ba15b84084cee40e096f03b115cd1029f179f2d7994c1b810abc2e5de1e3026a08d263843ea4ecaaaf2347e5af2ea541ec95655dad9e9ab2d752152b7d27f", 0xf8, 0x5}, {&(0x7f0000000140)="9d2cef3f73e5f3b523ac8ddf082900000000000000da0cfbbe99068120952d11be3b77da58bb38a353020d72fa6854ec86deb786e86d31c869fa90acb3079165c209657912bb66ada537d93a1052762982bf4498", 0x54, 0x5}]) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() ptrace$setopts(0x4206, r6, 0x5, 0x0) tkill(r6, 0x21) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r6, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000100)={0x2, 0x80000001, {r8}, {r9}, 0x1f, 0x7}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f00000001c0)={[], 0x600, 0x7fffffff, 0x2, 0x6, 0x100001ff, r10}) [ 213.952926] Dev loop5: unable to read RDB block 1 [ 213.962611] loop5: unable to read partition table [ 213.978811] loop5: partition table beyond EOD, truncated [ 213.994445] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 214.091992] Dev loop5: unable to read RDB block 1 [ 214.098305] loop5: unable to read partition table [ 214.108952] loop5: partition table beyond EOD, truncated [ 214.115974] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 20:49:23 executing program 0: r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$rds(0x15, 0x5, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r4, 0xc0045005, &(0x7f00000000c0)=0x9) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[], @ANYBLOB="ffff070000000000", @ANYPTR, @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00`\x00'/24], 0x48}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x12, r5, 0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f0000000800)='./file0\x00', 0x0, 0xc48, &(0x7f0000000c00)=[{&(0x7f0000000880)="487e78d91c2fb1c93b1bada1c911c80e2d675d391bfbe6cdf9f10f83065a2ff1d0f3e233e6953361cdb9111fe174e2114808426d0b416629fc55ba03444842aa1640581a6706927d7f24d0063fbfef52434e39cd8d8fc0fbbc363114c10da481187f4355a373edc92e65379505e15166094384c58f70c97260173fc22fc3e8dc6850297fdc32821b8de13ba306e3510e68d431ffe99a22926e2278e10f0cda629f170b096ab06a29ae52759dfa0a8fcc9b014aadb3fe38dfa0a4125f3ec56dc5339504baabfafad5dff5797df216f2a4c499ea7071258618d11bd46fe99185d43d52bbb389a872c24c2e8027ddc679", 0xef}, {&(0x7f0000000980)="853013f0caf558a8f1adcd36142200469225b3990113569e279aa68ee2d6030117bf6f3c89fddac3a1e594825063b94ba9e9741c7d9dc6d7ee41b18c3efe5e1572c4bb9daf49b2db7c14a5def580fea06e4977859acf7513159e08bd5c890d1d0890090a24507b1b608d1c44ddb6620025503de90922f7301361fbabcd6f0047ef7bd81f4d935bf5eb151b24eebb4235383e", 0x92, 0xffffffffffffffe1}, {&(0x7f0000000a40)="517de589a6c032ab8c22f940fea02866fd4337a3b7a2fafb1204c879a3744f24013001e46f4bbb859d50ae6bd35502c60710c04d717af64851a15fb5970d352dc182e870d42b11ec60a4857ab84ce7a60993b6e357d25462b487bc7f97fdc9e06a1641f8631c57162acabc67a9c8298803e62689072ed168a7002ae878d23989bd3e9d", 0x83, 0xecc5}, {&(0x7f0000000b00)="5a4c3b2f019c7138c9fa6bfd9fb8123dc84f0837ad6fc35907bc401c02288f1f2ae3c2cc945c49f7a1dfb657330bbf986afe88cfcc35dca183217b3b28a2025e1d809678", 0x44, 0x3f}, {&(0x7f0000000b80)="43298ef5797ef8b148cd1e414c6d0f7c2722e354dddeb30533a8bd34ea3f2e073e06341e5d91f9fca85e3494e451f8ff2a130f74099eb984780625e403b2cbe1e89341ee62348bd3f89e74d82c10d4126cfbbbf3927aa5a3eead9eb1f31aa33200", 0x61, 0xd9ac}], 0x10000, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"]) 20:49:23 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x40, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8982, &(0x7f00000004c0)={0x6, 'ip6erspan0\x00', {0x7}, 0x40}) 20:49:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2511, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$packet(0x11, 0x0, 0x300) socket(0x28, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000400c2b30005026311be09712e000000", @ANYRES32=r3], 0x2}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='`\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r3, @ANYBLOB], 0x3}}, 0x0) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) setsockopt$inet_dccp_buf(r2, 0x21, 0x0, &(0x7f00000002c0)="c9258a54ee421701e884633a977c2ca55c5c733e72138ec24c6a0852e5649790b0db2e8cb4b7a433bbda5d1ae3ca7a7f4a429f4ce158037ef9b8a5fa013b228341dc46ffa86f109332aac8ecc37a158e43d153f7e3fca5d6a2074c355b8832f543490829da930a748d86f145527a7ddf8f618fce803208ab8215900eece87b4f698880a2bff90b32", 0x88) 20:49:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:23 executing program 5: socket$inet6(0x10, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}}}, 0x78) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0fb2"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe36, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000140)={0x4, 0x106000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 214.476712] kvm: emulating exchange as write 20:49:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae9651"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 214.872610] NOHZ: local_softirq_pending 08 20:49:24 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_open_dev$cec(0x0, 0x3, 0x2) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) dup3(r2, r3, 0x80000) r4 = dup3(r1, r0, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x800, 0x0) ioctl$IOC_PR_PREEMPT(r4, 0x40046109, &(0x7f0000000080)={0x40}) 20:49:24 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcsa\x00', 0x40, 0x0) 20:49:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x7) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r3, &(0x7f00000000c0)='./file0\x00', 0x511000, 0x0) recvmmsg(r2, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x20, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmsg$NLBL_MGMT_C_ADD(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB="794e98ca3100001d5615ce8a37e63a8286eab131cbf97d3bc02a6ae2730442aac2e66a9c9e0bb8ed6a32fafdacb036c28642f5ef30ffece96cae958d3ff4d641335cdc16d6b694fd740c9588cca3c94ba6b017c41b910942abdbc66072985753362aedd3fbaf90194789f489006450d9711826d580445c7d8e053706d533a6affcedadca29322a2bfc286d3f19fda9fd2025e635d412357307634376fb8370355a8d40bbc933bcf31f6e000000000000000000000000000029d106a878341ffc8b1c60f4a569ab5363468b5c1ff47349a1270440520c78693e31686bc38696a37bb5d823142d17785f0eee3867664adda6c684", @ANYRES16=0x0, @ANYBLOB="00042bbd3a20007a6a2077000000004d0000000008000200050000001400050012b88de9647971c6f9feffffff8b8cb0"], 0x3}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x2}, 0x2200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_yield() socket$key(0xf, 0x3, 0x2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') openat(r7, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:49:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0xa0080, 0x0) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:24 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@polexpire={0x240, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x0, 0x1}}, [@migrate={0x180, 0x11, [{@in=@rand_addr=0x200, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@local, @in6=@dev={0xfe, 0x80, [], 0x2b}, 0x6c, 0x4, 0x0, 0x3503, 0xa, 0xa}, {@in6=@empty, @in6=@remote, @in=@broadcast, @in6=@remote, 0x32, 0x1, 0x0, 0x3503, 0x2, 0x2}, {@in=@empty, @in6=@local, @in=@remote, @in=@rand_addr=0x81, 0x3c, 0x4, 0x0, 0x3505, 0x2, 0x2}, {@in6=@empty, @in=@loopback, @in=@empty, @in6=@loopback, 0x33, 0x1, 0x0, 0x3503, 0xa, 0x2}, {@in=@broadcast, @in6=@local, @in=@loopback, @in6=@mcast1, 0x2b, 0x1, 0x0, 0x3502, 0xa, 0x2}]}]}, 0x240}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/202, &(0x7f0000000180)=0xca) r2 = syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x7, 0x86200) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x80, 0x1, 0x9, "f969c359ce8d19a790448140172101e9", "c5f50c7480af9c3fb5336f0d01113905b05da36ae266facb293dd31c8bb8bbb05f745ecb0ad3782325cb114af43d309730a46766fc3918aa63a8c9285ca00f4203e3a27cb7583aefbf3363514f6a6049e030e8e490ec860d4550cc422c6057fe03c195446fcdc0fa4f6080"}, 0x80, 0x1) 20:49:24 executing program 5: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) close(0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = getpgid(0x0) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(0x0, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x200, 0x0, {0x0}, {r4}, 0xfffffffffffffffe, 0x20}) wait4(r5, &(0x7f00000000c0), 0x1, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, @fixed={[], 0x10}, 0x5}, 0xa) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xff, 0x0, 0x1, 0x6115}) 20:49:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x12, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef88836"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x240000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3c4, 0x0, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x3f, 0x10001, 0x204, 0xffffffffffffffff, 0x5, [], 0x0, r4, 0x5, 0x5, 0x2}, 0x40) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/handlers\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:24 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) setfsuid(0xee01) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) 20:49:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) clock_gettime(0x0, &(0x7f0000002e00)) recvmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/146, 0x92}}, {{0x0, 0x0, 0x0}}], 0x3, 0x10020, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0xd8, r7, 0x20a, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x62ab}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK={0x70, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x48010}, 0x8000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8983, &(0x7f0000000740)={0x7, 'bridge_slave_1\x00', {0x4}, 0x7fff}) getsockname$packet(r3, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x63565, 0x5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_ADDRESS={0xa, 0x5, @empty=[0x4]}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x50}}, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 20:49:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:24 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 215.479858] audit: type=1400 audit(1585342164.667:67): avc: denied { create } for pid=9120 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 20:49:24 executing program 0: io_setup(0xa, &(0x7f00000000c0)=0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000080)={0x9e0000, 0x1, 0x9, r3, 0x0, &(0x7f0000000040)={0x9b0907, 0x9, [], @ptr=0x7}}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x806, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x20000005002}) io_submit(r0, 0x8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000040), 0x65}]) 20:49:24 executing program 5: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) close(0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = getpgid(0x0) kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000200)=0xc) setresuid(0x0, r4, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x200, 0x0, {0x0}, {r4}, 0xfffffffffffffffe, 0x20}) wait4(r5, &(0x7f00000000c0), 0x1, &(0x7f0000000100)) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000001c0)={0x1f, @fixed={[], 0x10}, 0x5}, 0xa) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0xff, 0x0, 0x1, 0x6115}) [ 215.563095] device gretap0 entered promiscuous mode [ 215.620475] device gretap0 left promiscuous mode 20:49:24 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:24 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:24 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./bus\x00', 0x8, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="a780", 0x2, 0x7a6}, {&(0x7f0000000240)="3e69e9a2955f2378c68d7dbdceea58b961317c714e9bcbe790b9cea7ef762316a9936987d242b387b8501effa592321c07812ae838a7cb2f07603b34c8a4a06508a6ccab8caf5400a76b5a792a496813589494cd0d7a8ad49c9880923a771a918166198dc7d3613f11f46f2fcd1a21040cdbb2d547c2322264d97137ed259bc56600e1c331a2f52c3c5175fb74014c95122307a2f312e6f60f173ba4c319fe5913f58aea67d76e8fa20de315fd0eb1dbc30ac0bc76490c7371cda4ee6f418fcc9ff3db5d948d42b6b895c73c489bee1c2156f2e04eec5e5252cde9be327817ddbc", 0xe1, 0x3}, {&(0x7f0000000340)="83ee6d4c3437f29a259e4fbf8afbd38e4c123e57f39987b9ef1d1aa8040508c4d2e21760062cf199a99733e8bcb7bd", 0x2f, 0x8}], 0x1001424, &(0x7f0000000400)=ANY=[@ANYBLOB="696f636861727365743d6d61636963656c616e642c63726561746f723d968daade2c7063723d303030303030303030303030300f7ae55e82e8169886352d25c4ea30", @ANYRESDEC=r6, @ANYBLOB=',\x00']) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:25 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:25 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) 20:49:25 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x100000001) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000003c0)={0x38, 0x2, 0x0, 0x0, 0x5, 0x2003, 0x0, 0x0, 0xfffffffd, 0xffffeffb}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvmmsg(r1, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f00000001c0)}, 0x100}], 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0x0, 0x300) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005faf00"/20, @ANYRES32=0x0, @ANYBLOB="020100000000000008001b00fcffffff"], 0x28}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000240)={0xa, 0x4e22, 0x3, @remote}, 0x1c, &(0x7f00000002c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000017c0)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR64, @ANYRESDEC], @ANYPTR64=&(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f0000001a80)=ANY=[@ANYRESHEX, @ANYRES16, @ANYPTR, @ANYRESHEX, @ANYRESOCT, @ANYRES64, @ANYPTR, @ANYRES16, @ANYBLOB="4d61e7bd63a0b3811beaca9d0a92c1d205e2a3c6a530cf8ae01e585d28793cdbb76653dceadfacd241cdfffa464d7bb66ae100611df231a56a0af7c99cb257f0425b905ed1454a3b678a9b3dd922af9d6706beb00b0433d225291789a9e66420228a5435674a3b06dbc50b02c0f6084bb13dafceb3bb12189eaad99166a4d1552bc8f4c8d4836d5858fe39eb7da236f21d04dc599569be7e1220640797ab11dcbeba09c197256dc024cc9f63a32f1c6bce221b5b1dd86d439a200da3fd0376227f58365bc5134ae5d55ce80b46a01ba2c466824a50d89f7f7dc13985e4a172", @ANYBLOB="827c9337a2ae48ced12cc6275940b62044a7eae936aa5a23298d8628f65301daef0608ca9519b3d4919e0f351c68377023333f862660a3e27d41d5f59625d66696e2a850fece543b4e9849dab1098b72f56bf4dd7d4553e0c8028b57e241c66d7f85c18849d2eb53b22df3d1888004f21f5cac3b6f89e54a34e9261d27f1e159df94d0e0b684aaf69318f58bf5a657c07f4b64d5fbd2424fb704ef0000000000350542e704c05b43e24dfe72b5a6becb174076d425d1b73a45e37b8d63de0c1fc885c6e30270b4bb7955e8b38d50ec3a060afe22197c6ddc8ac2a1c0325301dc9c2a01f1"], @ANYRESDEC, @ANYRES32, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRESDEC], @ANYRES64, @ANYRES64, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="cb266e342de1ed2b4e63e8931bba690ba011b0ba4a56f302e9aa666e692f89aeed3512cb57989f3e36c4b738aef0854ef6e8aa1a88c981c58b70e17f5098df8d001a3f377a941992508259988f7a3abe4b183fb1bc1ccf85b0aa68ebb834642778ff3bf060b46203568b1531207c375204382dabbcfb547e6bfda860a950a2e8aa12a35a89d93d3abc930b7e97f319ccc68683c350a096106c118d404fe5b72e138add8dd15305def685843c04deef2e89c8838e07ad251b79dfa92a842a5313c8296b01f9573888b8c4d958c42c4fe5b17eec851b10151180c92d1a0ca76fa01554b53e271f4fb0ccab1423730a7c80c1859b6d4099c58ee94a8097acf5ccc11e07c492df36c69369590cde3e0094d81d0e58d95ede29b065d172d14130935af37d6bcc4915873079f5f3c04c0a4874446ff4703ea1a703655c72d92c556521cf3571a0e76038415a8be1cb43318f5398ad12a7c75ec31c0443579c0d4b37c9b848704e52a57b4c58acbd69f06cf1e24ea27540efa982b58d176a89c825f84f525d74c0735f2d0fb45e124d756b01f365788b6ac2cb748c7c0bd2b5070622c30078a0f6ff1683a895cf8236a16bf3bdd59eef8132dbe9d6eaa24146e06e96e2c121f074c56710efed1a32f4345972d9f698b7d73aa710b5c7d903487b69a715026bb255f53f5bf9a54ce9143e0c59caa3d1d8bb82c511dcf87bf544b276afbabe79141b57ae37730ffc12c702d3553b7347e86232ed2b7a287e393d7d255e7b5d80d67dc9f4ced7b14e046e546e2d2d6acd1a26d3df6b3d6e43ce0d5cce7e5201647eeb443127187182d512f2c2088fe787006a222f1bb0bfd1273916cfa55a7906e14088b48a127fedd773567656d8db6902baa546a865f6be1b26987a1ade18616dccd88ee7b97a4450197a4d73ee37fc78fc89f424b87f96dd63e555f8010da5af05ffdc5ec40fd5a4612f42c56ddb402a5d13ce9b3353fdba3a6b06926bbc108f4f3594de4062ffd361c318c19a1aefccad6f19e67bed967bdc44d6411dec99f240b078e1cd49d2579b3c94356e9b852e03f68b50c70a338c39faf53b6c54815ea90f87a308617cb7fa22a1a5398342071cc97dcab052b92697f255e71e65df48e1ba6b76e43e02d6fd6acd0b10f94a05f18dde054fa0df681116c40e42821f0b4145228f38e882674118d84f40d89cd1bf8409bf1162f2198208be832697ab1ae0a0e9c28409ccb06539aaa7c369d2e0401fb265efe3f2be18a3ead0495546364cd02c76215aea7e6730e1ee5f4d0cd2ac6e7f924d16ed1e7d6fdf6e4223a99d605dc2367f436162209475a990ae204c7764c2f863086771b1ac660b7db64c8e7c028f1af3e01067aba75ce8e10e31517ef9b74a6b58cc899c86bb6713f88eaf3f0c9c299ada00e3f04745caa7957704b50c25045dd81b875fa25f5736e63c7c2d197a34e5978c692ea4edb2100a44029184f95e8eaaa2c39869b983665a74b6cd84d96db8cb84ad5af0642fdeb61cb68288ca203ebe424a526612e30d7bac9ffb31e8d8ab9b8af4a61d708eb1135ada8d0757ff88b4dec619b8c7920dbaecb8296dbb7cce0d74b91b565dfaf66d7f0e4ccdcc63eb03420a2e8b982505433f50aa34ed89173de7601386d1183a16706d092b3c69e46529f7da35af33efc3cbf716dd959703cfebff103f776f56ca2413bf907872f5516a9a78ef3ad022979061d52ceed47751dfdac827023fe6e7b80733c3abf411b2fb36ff25c23a00427cfe290ce071c4afa9e503e9f9aa9f10718b39343155a930b763c8463f47d84c447d04916ae913337d7cb7a167cc3376119a8ffcb4ad88e351c7d43537596f2199943726633ac08e7e0486b02a549e56262125e66a555a4e4660f23132821c78a95d67fb6a97691016de87e69c807f93aaaf958781b0e3de28c3ee9c58dce3327204ea15ab5f60046cd8e9bb5d001650c20981a7386bcf88330cac713d7b5fd5b661c8b744b0a2edda4074fc97a81f4f4931dd89393d2af6a6f877d794139a5922b2b22cbb755267cc6a0fb285f00b8c958a7b1f9da7f9f5e96e07cfc29e0602e404b3a853fd7cc201d0d32297fd39f578d0808891deb86910f87db3f84b942d1d04d85f39cc4ffb306267e01421880d15296da99e2d87b1ce2654e2583cce48add2e8fb6ab1990a93d8f73ef0d0f5f899bce1c78acef27aa52e291eade58280058e9d1f17a88e984afc6f311e1968a172188def70ce928d171a8b42183e4d2d06652ec20f042f5b3136a838fbd917937d5f6a8cffc87085987580e63ed367bc0fd8c80fbc664870485668dc4f68e627340489e373390a03c80441a23fc45a8b078f8d5a14f03654368efc11a11c327c8c38e993d8826fe5382ca687dfa424cbee4562c661e4d8b4ea4d15e7654627f434afb90a2b4329302ee622d74593aaf844bef8379c6cb46eaf04c465c9b90c861031d2800c3e00becc305c6c489c41794522056e11a91c9fca237f4fcb3262049a273014c91e3278f20b98161403e453052b070341a2fc73b0de65cc51ae07f25c6c62616e600203a40bc8310e1368855a6ee8cf9c021fd1546d562c5d93cc3b8738514814285a89cf4922316b1f5ce49f9c256d60357e3c731b0384ecb74ebfb83f996018b835e7befa7de87fd3255c1181f1d47613fbed024f17e7b3714a78569fd47dbd444999381d8ba035be8a80bc6c2aec1d34c888084fb56cf7dd1a80ad2c75f7b06f3e7cb529c02e93bd94dcdaf334542b419285c3bf1343075e38cf7a84cce37744c30178d9ea6ec449789af81ec5656a8c48950917a180d75ce36c02c66631a26cf4e87b5b7602e1298ec2e8d9e81631af2cdaff412cf31567ec8aaa23ab3fab3ca0c29842fa1463658c84b64d53eb891b85ffe302be1e071f9079de804ba4aa3b98e5e1b8ae286a58b0ebf60f15b55fea2204d4782e5f2e4808e056daf77aae546c2fcad2214e77f2c1ea405f988a1563238bec362a3652f42c710d0d46c39be8e64c62c8fe5cc1bafffb91a13b0411b1c2c8bfb5386db875ccbe18f2487ba3688da01c2b6ec4cd35f24f06f3beeb254bdc9396a74ea9b99e5ffd99495b9bbab0c1dfa29391cdaa450a20e6dbef85fcdfca70b35d61bb07aa51113c447f331c9cc72bfa43a652166f1a47a743948849bfb50c57e1b539d7ab71ad9e8202399e748f109a4bbae04432e8eafb8f217a21d9c02a76776c171e13a61bfbd26cc098a0946407a5c90b983a33dbd00cea0d2484f18a10ae2a605a8a5ac03470577f2eb34bb3e606d904b1b117d538d7b8e7105ea947eaa61d78e177dfc11cc89021f45fa9ef3431e476fc70c14e035c480823caf437524922ec80daf65b12707461a847dc1597854d3e3a3747319c15108766985c972bc894500ac8ad5c68f403aa6413b567d487e7478120fb262d00c2e47dc23ae20e7257cb589a717988583bd21380d5abddb9d8bac81682ff9abeb6bcd039ec34fba6187e85f904c360803c073e32c6886a3145e18f2d0762922d19f546178ac97a122b59c461e871e67bc151cc9359ed29e382ebf7612c2d19c96e206d66fc975f4fb7b2be5eb395177187d1e96056765336a6ffd5b3f0810e2f2697022b2557241be9d06ad009ae5f9cf06152e7856a64fa1ceea9d32453dffad5c10b774855ca8786b161941d199b9e085a53054625a361a8fea17039c89a05dfc1d1203aa8316124fadee8fb6c71af9bf444c38d8c794d5d85520d5fada8655cfd7d2e47bf1855a3545ecbb126b2e7b9bbc3fe7e3d50d9f0ffa9bbb4a36c7daa6294871889df02e7168f89015201247a7038eaf104b52fc0cfbd1985b2d920e25036360bc1e208ef2baef587900ce18252a4b7854ffdfa02d93885f495659c844db801fa863ea39ffe575cec1f55dba9bc5ed4b7a6f4e8d7f98fb6b0ee64a567e69da927ef94788d3c89575fc576756428d12f469f2bf11d62f7c97f997107f684b0b4d00ad3b5f2aeaa26c42cc58e624234ca56209bca6d00408417b1f1f425392007f3dc4b1934f39a1a81c3d5e23374359b88e3a08568cae3497f19a9bc192a341430bd9c1078c712488b349a07c677616585424efa6cbc3411c3cb785bbcc078364e9d3ba4adb80fadce941e00e48bb1c8e12dc5f25a540575a0e9fe6acfc9196d4668e46d51d176897dd16cfc9f9ec23e774cbac479e38651d805ae4a2d9e3a2d21444ed71c41aab47597224d828b98134ca24630462a62f62623a51d69e8ea004eb117914a0da2e6e15c8a6846e9616d68ce0e25ea201f53831a2017bf277f98b7c6194cb43093002f3947a0787b67725504a86d3356520c56f9842d313462bd644245436fa35cfb8cdf1aad0e35b6773c3b3c199782dcb289575adf84a95abe93d132c724316128f5fe2db346f2cc79f41dc0ce042b55c6489a8c4303a1db3233e8325837262896de978a318d038a8b8a84f443104e7a03c99a64c09fc9a286bda95d37cbd78d3dbf236768bd0fa7fda0b2985893578b3400ad8ef4c1f002f91eacb54ca4bbe9238f3b8807c523cf6092e9ca8c6cf342af5118d74bbd70bffce7a8addfbe57cc81bd4ab44a3e7261c7ba9b91ab5d6e4e09621efc7f4bffb9dfd365f8ea84a4f5131dd90b5fd82ce7683e9e8b0790f3c956894dda34cada7079f748d1f53b7aaa20a5843f9b88f811719d6df5d91b724918b208592af0afb17234370c9898e14bd99c63db067fd6ebe80d613c481ca8285191f17b9ffac736b1fd7bdedb18eedec8d2de32039be27e126488ba0ac0b3e712175aa39499e39bf36989964d0a8d83b48bbe10f06cd4d022d15ed950bb2eefa7304f9e81b53eb75b965e39e6f2bb743e2f8f28c603d393f9a65974ca370b5ca4eeb1178ca2de169bdaeccccc4b2d720cf7d690c168f78b8adcbe321d168705693c39f8a231fa37ff1e2efa43537f3bcde4eb1f9dc31ed6443f35a31a9cf269904c36a6710ab7a8b065f53f3f646c1b1c9d811ee10afcc89b0d9957523f8a1a96fd1b43db29f2992dd1220cddd9077c4728f64979d38c19e8c5b20d4ad9c1cc822654ce6c39c22632b5eb44111bc526bfafd556dcb589c2fe157b6753c3fad872fd428044ef6ad73a9924f38756bf8e0aae1b5ac1885b349f7f0ca0c9fc374261e3f2f5f22a1b7b35d87dd46e3a54b4174b5efa1b0f0156f1f812f7c9a45c99d9ae0fec4125ce92356417a149f4172a7c874afdacb66bb5f496d278d168ce6dfd96896eac705e9126cad92198fc993452a31c645d7f6f580bb99abad0f8a1f4baa783199363442abf720f1669443f1ee400c66b85a5bb85c28312720a91cd82056748acbf6766a493ee9c6d6ef1293029b4b49f6380b2b44962fd4dd396efa11cca2c75e0d10cf6e647c2e5fb0e28aeaad2862209fef8532b179baf79d01bb7ce5fff4207ea938900907391cba2a6438acdda9e0ddf9b8ae0ce4797a2806acf89ddac55a1db6f6995630d65ecf7b90ef54c08a25970d7d215d9242c847b201618578850259cf9d42ce85101dc43a758e7e5228e7deb3b8c18a2ce57f0e0846c6720a588ebcac1738b2805aa8faaf035363d89166c1711b69f97a160bef21c68bb6e02e9f774ed1cb36f75ae90c047973fdbc98c0a8fee70f6af84e3e14be3ab4bac47b0fe411a63c1954fe8c45e7b557f79b77486683466fc1d4c60d29833e74f339e4820c45c171b20bdf964c5050cb294900faf92fa5f4bed6267a57a4dce1fdacc414241974e8e352eca990108fc98f25beeded85d97d2a57ae0fb831492eae4", @ANYRESHEX=r0, @ANYRESOCT, @ANYPTR64]], @ANYBLOB='4', @ANYRES32, @ANYPTR64=&(0x7f0000001700)=ANY=[@ANYBLOB="15e7fa21d7208aa411044fa99289e4466b1cc998d458d1b32a6b5593022e742fb8d07bd9676dec2d90702d290fc94b21072f3dfa65b8bd8a6fe3fb81001d4b971858e93221114c11e9ede5704d290eebecbf330e8115e0ba13c6384c5eb3f286115626b6f6ba469b03a068cb6579685b"], @ANYBLOB="be28d48b444dcfbce63e2b6faada470b7ad3fa117c25682c7bd62f02b24cc6af1c3cc615723fd4873a59b05debd48e2a88dd6891a523b5013aea92725da65123a2dfe1071abb7d328bc6077d564477f58eab3a27504248637bad7abf69071d5501d5025a9879f080311585c9ce2fefa15c4310f676088264680ba389f5803a118335e18a1854e9205f5d243e4677a4e9b68808acb5b2e4b3c62c756fa0f4ef5411e9803758698aab738a014d15f896f909ca377f68b87143846b16ac30b4f9b338de1d74be9685a6d96ad4cb5407cbd25b40ae58f7ed5360638a8de15e6cfcb11a5b1f4ebf990f830dca3b32f953f18befea", @ANYRES32, @ANYRESHEX, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYPTR64]]], 0x8}, 0x4041) 20:49:25 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@polexpire={0xcc, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast1, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, [@policy_type={0xa}]}, 0xcc}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xb34bc68f50d5049a, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x1}, 0x10) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf7080000004b45204c096e7578"], 0x10) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=r6, @ANYBLOB="150020009cbe7be62c5827e600aca0c10ebf510365ba8288d4"], &(0x7f0000000200)=0x1d) 20:49:25 executing program 0: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000002800)=ANY=[@ANYBLOB='#! ./file0'], 0xa) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$nfc_llcp(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x60, 0x80000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001480)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r8, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x84, r8, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf1}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7ff, 0x336, 0x7fffffff]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x7, 0x3, 0x748, 0x224, 0x9]}]}, 0x84}, 0x1, 0x0, 0x0, 0x80}, 0x20000090) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000000)=0x8001) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 20:49:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:25 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) [ 216.168484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9193 comm=syz-executor.3 [ 216.188594] SELinux: policydb magic number 0xf77cff8c does not match expected magic number 0xf97cff8c 20:49:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x0, 0x104, 0x0, 0x25dfdbfb}, 0x14}}, 0x4040854) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001500192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd0000000a000100070c0900fcff0000", 0x1e7}], 0x1) 20:49:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 216.266065] SELinux: failed to load policy 20:49:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:25 executing program 0: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000, 0x0, 0x0, 0x100002, &(0x7f0000000000)={[{@quota_off='quota=off'}]}) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x4000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f00000000c0)={0x7}) [ 216.947642] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=9193 comm=syz-executor.3 20:49:26 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) 20:49:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:26 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x1010, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x6, 0xffffffffffffffff, 0xa) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0), 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x1, 0x44080) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x618) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000), 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000002980), 0x22a, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0xfffff05d, @remote}], 0xfffffffffffffec5) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) connect$inet6(r2, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048081}, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 20:49:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000380)={0xb, 0x0, 0x20}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/137, &(0x7f0000000340)=0x89) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000640)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x637d], 0x0, 0x20002}) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f0000000500)={[{0x9, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0xfe, 0x84, 0x1, 0x3}, {0x40000, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x99}, {0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:49:26 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000000000dc7}, 0x100, 0x0, 0x400, 0x0, 0xac1, 0x200}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80000001) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0xffffffff, 0x2, 0x7fffffff, 0x1, 0x17, "10614d693dd2b18ddd251920dede3df1956bcd"}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000003c0)={0x0, 0x0, 0x3e, 0x0, 0x0, [{}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) close(0xffffffffffffffff) fallocate(r3, 0x0, 0x0, 0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 20:49:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:26 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4df5f873574f257e0a01e2a6a02f5e071383fab889e335c3be9b7b795a66", 0x65, 0x10000}], 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x21) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x7fffffff, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7fff) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000040)={0x2, {0x100, 0x21, 0x25, 0x21, 0x7, 0x10000}}) sched_getscheduler(r1) [ 217.172184] *** Guest State *** [ 217.188573] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 217.201242] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 217.210555] CR3 = 0x00000000fffbc000 [ 217.214633] RSP = 0x00000000000000fb RIP = 0x0000000000000000 20:49:26 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) 20:49:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 217.265695] RFLAGS=0x00020002 DR7 = 0x0000000000000400 [ 217.297779] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 20:49:26 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 217.340075] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 217.380240] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.437366] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.494865] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.517834] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.533135] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.554118] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 217.581862] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 217.613545] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 217.628880] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 217.639941] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 217.654247] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 217.666473] Interruptibility = 00000000 ActivityState = 00000000 [ 217.674321] *** Host State *** [ 217.677624] RIP = 0xffffffff8116f8df RSP = 0xffff8880503ef9b0 [ 217.689713] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 217.698954] FSBase=00007ff99548f700 GSBase=ffff8880aeb00000 TRBase=fffffe0000003000 [ 217.708194] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 217.718180] CR0=0000000080050033 CR3=000000009f77a000 CR4=00000000001426e0 [ 217.742922] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff866018a0 [ 217.769551] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 217.785916] *** Control State *** [ 217.796631] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 217.819857] EntryControls=0000d1ff ExitControls=002fefff [ 217.826145] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 217.836391] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 217.848902] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 217.859579] reason=80000021 qualification=0000000000000000 [ 217.866733] IDTVectoring: info=00000000 errcode=00000000 [ 217.875628] TSC Offset = 0xffffff887eee1130 [ 217.880730] EPT pointer = 0x000000008085b01e [ 217.887259] Virtual processor ID = 0x0001 [ 217.908152] *** Guest State *** [ 217.911783] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 217.920898] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 217.929921] CR3 = 0x00000000fffbc000 [ 217.933925] RSP = 0x00000000000000fb RIP = 0x0000000000000000 [ 217.939921] RFLAGS=0x00020002 DR7 = 0x0000000000000400 [ 217.940991] *** Guest State *** [ 217.946169] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 217.949613] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 217.970933] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 217.979036] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 217.996788] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 218.000134] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.015825] CR3 = 0x00000000fffbc000 [ 218.020211] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.027642] RSP = 0x00000000000000fb RIP = 0x0000000000000000 [ 218.028213] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.042278] RFLAGS=0x00020002 DR7 = 0x0000000000000400 [ 218.059499] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 218.070838] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 218.072007] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.087836] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 218.100307] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 218.100977] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 218.108448] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 218.108458] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 218.108469] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 218.108477] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 218.108486] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 218.108496] Interruptibility = 00000000 ActivityState = 00000000 [ 218.135452] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 218.178555] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.180152] *** Host State *** [ 218.203960] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.210128] RIP = 0xffffffff8116f8df RSP = 0xffff8880485ef9b0 [ 218.217976] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 218.220314] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.224533] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 218.249408] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.250144] FSBase=00007ff9953e9700 GSBase=ffff8880aeb00000 TRBase=fffffe0000034000 [ 218.268777] device bridge_slave_1 left promiscuous mode [ 218.270608] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.280699] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.299885] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 218.300137] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 218.319859] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 218.331041] CR0=0000000080050033 CR3=000000009f77a000 CR4=00000000001426e0 [ 218.341083] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 218.341664] device bridge_slave_0 left promiscuous mode [ 218.354557] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff866018a0 [ 218.359230] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 218.361334] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 218.375156] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 218.380321] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.394961] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 218.400154] *** Control State *** [ 218.406157] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 218.415131] Interruptibility = 00000000 ActivityState = 00000000 [ 218.431253] *** Host State *** [ 218.432996] EntryControls=0000d1ff ExitControls=002fefff [ 218.434580] RIP = 0xffffffff8116f8df RSP = 0xffff88804831f9b0 [ 218.440223] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 218.450200] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 218.459566] FSBase=00007ff99546d700 GSBase=ffff8880aea00000 TRBase=fffffe0000003000 [ 218.460248] device veth1_macvtap left promiscuous mode [ 218.473264] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 218.479957] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 218.487359] device veth0_macvtap left promiscuous mode [ 218.492965] device veth1_vlan left promiscuous mode [ 218.495851] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 218.498519] device veth0_vlan left promiscuous mode [ 218.509056] reason=80000021 qualification=0000000000000000 [ 218.514942] CR0=0000000080050033 CR3=000000009f77a000 CR4=00000000001426f0 [ 218.515485] IDTVectoring: info=00000000 errcode=00000000 [ 218.535083] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff866018a0 [ 218.540276] TSC Offset = 0xffffff88180347e1 [ 218.546253] EPT pointer = 0x0000000090e3d01e [ 218.553259] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 218.555273] Virtual processor ID = 0x0002 [ 218.566027] *** Control State *** [ 218.574012] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 218.588734] EntryControls=0000d1ff ExitControls=002fefff [ 218.599877] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 218.607008] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 218.614047] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 218.620842] reason=80000021 qualification=0000000000000000 [ 218.627346] IDTVectoring: info=00000000 errcode=00000000 [ 218.633319] TSC Offset = 0xffffff887eee1130 20:49:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{0x0, 0x9}, 'syz0\x00'}) socket(0x2b, 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, &(0x7f0000000200)=[{&(0x7f0000000140)="580000001400adfd8a987e40da2e6a262b", 0x11}], 0x1) close(r5) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r4, &(0x7f0000000180)=ANY=[], 0xff16) splice(r3, 0x0, r5, 0x0, 0x80000001, 0x0) 20:49:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) 20:49:27 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) 20:49:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 218.637745] EPT pointer = 0x000000008085b01e [ 218.643590] Virtual processor ID = 0x0001 20:49:28 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) setresuid(0x0, 0x0, 0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000140)='\x00', 0x1}]) [ 218.779962] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.797134] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.816791] device hsr_slave_1 left promiscuous mode [ 218.831068] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.848999] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.870976] device hsr_slave_0 left promiscuous mode [ 218.877139] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.893916] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.907005] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.931011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.962673] team0 (unregistering): Port device team_slave_1 removed [ 218.980590] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 218.997065] team0 (unregistering): Port device team_slave_0 removed [ 219.015485] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=9306 comm=syz-executor.3 [ 219.030553] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 219.105683] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 219.168403] bond0 (unregistering): Released all slaves [ 219.240446] kasan: CONFIG_KASAN_INLINE enabled [ 219.245371] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 219.252830] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 219.259194] Modules linked in: [ 219.262414] CPU: 0 PID: 9303 Comm: syz-executor.3 Not tainted 4.14.174-syzkaller #0 [ 219.270204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.279581] task: ffff8880491a4380 task.stack: ffff8880487e0000 20:49:28 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0x12) sendmsg$IPSET_CMD_TEST(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x68, 0xb, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x27}}}, @IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x8000}, @IPSET_ATTR_IFACE={0x14, 0x17, 'vlan1\x00'}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000001}, 0x20040040) [ 219.285659] RIP: 0010:__smc_diag_dump.isra.0+0x300/0x1550 [ 219.291290] RSP: 0018:ffff8880487e7480 EFLAGS: 00010203 [ 219.296661] RAX: dffffc0000000000 RBX: ffff88804e241540 RCX: ffffc9000c851000 [ 219.303937] RDX: 0000000000000001 RSI: ffffffff86130e88 RDI: 000000000000000e [ 219.311404] RBP: ffff88808c98e140 R08: 0000000000000040 R09: ffff88804e241550 [ 219.318691] R10: ffffed1009c482b1 R11: ffff88804e24158f R12: 1ffff110090fce94 [ 219.326126] R13: ffff8880a440a940 R14: ffff8880991c5210 R15: 0000000000000000 [ 219.333410] FS: 00007ff99548f700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 219.341637] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 219.347528] CR2: 0000001b3142d000 CR3: 000000009f77a000 CR4: 00000000001406f0 [ 219.355000] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 219.362271] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 219.369760] Call Trace: [ 219.372375] ? smc_diag_handler_dump+0x1e0/0x1e0 [ 219.377142] ? trace_hardirqs_on+0x10/0x10 [ 219.381395] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 219.386859] ? __kmalloc_node_track_caller+0x38/0x70 [ 219.391983] ? rcu_read_lock_sched_held+0x10a/0x130 [ 219.397132] ? kmem_cache_alloc_node_trace+0x38c/0x7b0 [ 219.402581] ? kasan_unpoison_shadow+0x30/0x40 [ 219.407178] ? kasan_kmalloc+0xbf/0xe0 [ 219.411098] ? lock_acquire+0x170/0x3f0 [ 219.415244] ? smc_diag_dump+0x8a/0x290 [ 219.419247] smc_diag_dump+0x1d9/0x290 [ 219.423147] netlink_dump+0x3da/0xab0 [ 219.426963] __netlink_dump_start+0x4e2/0x740 [ 219.431589] smc_diag_handler_dump+0x19d/0x1e0 [ 219.436184] ? smc_gid_be16_convert+0x2a0/0x2a0 20:49:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000038000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000023b5922c90d1db26e58a72e306a78bbaf158fce7df486c60f7ae965121eddcd904d19ef8883600dd6f214a4a764f17b5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x16, 0x34000, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000f884700008100638877fbac141421e9", 0x0, 0x100}, 0x28) [ 219.440867] ? __smc_diag_dump.isra.0+0x1550/0x1550 [ 219.446428] sock_diag_rcv_msg+0x28d/0x390 [ 219.450674] netlink_rcv_skb+0x127/0x370 [ 219.454755] ? sock_diag_bind+0x80/0x80 [ 219.458742] ? netlink_ack+0x980/0x980 [ 219.462643] ? lock_downgrade+0x6e0/0x6e0 [ 219.466806] sock_diag_rcv+0x26/0x40 [ 219.470539] netlink_unicast+0x437/0x620 [ 219.474737] ? netlink_attachskb+0x600/0x600 [ 219.479163] netlink_sendmsg+0x733/0xbe0 [ 219.483255] ? netlink_unicast+0x620/0x620 [ 219.487497] ? __lock_is_held+0xad/0x140 [ 219.491578] ? security_socket_sendmsg+0x83/0xb0 [ 219.496352] ? netlink_unicast+0x620/0x620 [ 219.500592] sock_sendmsg+0xc5/0x100 [ 219.504312] sock_no_sendpage+0xe5/0x110 [ 219.508386] ? sock_kzfree_s+0x50/0x50 [ 219.512291] ? sock_kzfree_s+0x50/0x50 [ 219.516187] kernel_sendpage+0x82/0xd0 [ 219.520223] sock_sendpage+0x84/0xa0 [ 219.523952] pipe_to_sendpage+0x226/0x2d0 [ 219.528108] ? kernel_sendpage+0xd0/0xd0 [ 219.532219] ? direct_splice_actor+0x160/0x160 [ 219.537106] ? splice_from_pipe_next.part.0+0x1e4/0x290 [ 219.542482] __splice_from_pipe+0x332/0x740 [ 219.546814] ? direct_splice_actor+0x160/0x160 [ 219.551405] ? direct_splice_actor+0x160/0x160 [ 219.556013] splice_from_pipe+0xc6/0x120 [ 219.560341] ? splice_shrink_spd+0xb0/0xb0 [ 219.564585] ? rw_verify_area+0xe1/0x2a0 [ 219.568740] ? splice_from_pipe+0x120/0x120 [ 219.573068] SyS_splice+0xca0/0x1230 [ 219.576800] ? compat_SyS_vmsplice+0x250/0x250 [ 219.581389] ? SyS_clock_settime+0x1a0/0x1a0 [ 219.585809] ? do_syscall_64+0x4c/0x640 [ 219.589790] ? compat_SyS_vmsplice+0x250/0x250 [ 219.594383] do_syscall_64+0x1d5/0x640 [ 219.598369] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.603569] RIP: 0033:0x45c849 [ 219.606760] RSP: 002b:00007ff99548ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 219.614468] RAX: ffffffffffffffda RBX: 00007ff99548f6d4 RCX: 000000000045c849 [ 219.622259] RDX: 000000000000000a RSI: 0000000000000000 RDI: 0000000000000008 [ 219.629556] RBP: 000000000076bf00 R08: 0000000080000001 R09: 0000000000000000 [ 219.636839] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 219.644226] R13: 0000000000000ba2 R14: 00000000004ce68a R15: 000000000076bf0c [ 219.651502] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 11 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 7f 20 49 8d 7f 0e 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 [ 219.670689] RIP: __smc_diag_dump.isra.0+0x300/0x1550 RSP: ffff8880487e7480 [ 219.679503] ---[ end trace 3d99c0ed8fe5a9d6 ]--- [ 219.684740] Kernel panic - not syncing: Fatal exception [ 219.691625] Kernel Offset: disabled [ 219.695378] Rebooting in 86400 seconds..