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", 0x1000}], 0x4, &(0x7f00000002c0)}, 0x448f1) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xfffffffffffffd85) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2080, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000140)={r6}, &(0x7f0000000180)=0x8) 00:58:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0xc7c8f06784dca8e9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x1f, 0x81, 0x66, 0x0, 0x230f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}, 0x20001, 0x739, 0xa4, 0x1, 0x1ff, 0x400, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x5) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:58:03 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) pipe(0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x5a, 0x7d, 0x0, {0x0, 0x53, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3, '9p\x00', 0x0, '', 0x13, 'bdev,securitysystem', 0xa, '/dev/ptmx\x00'}}, 0x5a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xa, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000118080000008100000000000000", @ANYRES32=0x0, @ANYBLOB="000000000040000008001a000400020008001b000000000047e4ee84ad37a874b86d77665776ca98c887e8093b4c34c565b55ec57de34d27a8d726570713256f2d3ce8a657b9a5e18e58060e770f32bc4583a7ca136b470e0cb29ae8c4a45972d223e0f985d349974638cede051897d73004a8f30997c5018e4619b487af7f79d8b9497954"], 0x30}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000180)={[0x0, 0x2000, 0x7800, 0x100002], 0x81, 0x80}) r3 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 00:58:03 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x200, 0x80400) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x68400, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) listen(r0, 0x0) unshare(0x40000000) r3 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) ioctl$sock_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000080)) [ 455.609916][ T8798] IPVS: ftp: loaded support on port[0] = 21 [ 455.628381][ T8791] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 455.653262][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 455.925990][ T8797] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 00:58:03 executing program 4: semget$private(0x0, 0x2000000010a, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/154) semop(0x0, &(0x7f0000000140)=[{}], 0x1) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="de"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) lseek(r0, 0x19, 0x3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000000)={r1}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000280)={r1, 0xce, "f19d9d57bad116279feb96881b8da2d6a4190ea8b2987663af3e88c8ad02ff1f175f6547fc0edc82393519b656772031fead7571fb704f6c73c0c1ca036613c605c2be3571c521b40df0497af49d9ab5d50c687109cbca43375763bd51b35122cecb798520e4c245f76aa54e5e725087a35f1aa7f0e3097e239bc932a75eacf9b1ec6853028017a5fdcd4f87b0a4d341e77b8a9f019728baea3f1a2ef4ddd761f17da4b425e7609307696fea73a3c2771b5d9172fa3ea7aa98cb01cb6828a17e4c85f74bdcd670bc2f432f0ef745"}, &(0x7f0000000200)=0xd6) semop(0x0, &(0x7f0000000100)=[{0x0, 0xffffffff}], 0x1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x8) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0, 0x0], 0x2, 0xaa3}) semtimedop(0x0, 0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@struct={0xb, 0x7, 0x0, 0x4, 0x1, 0x9, [{0xb, 0x1}, {0xe, 0x0, 0x4}, {0x0, 0x2, 0xffff73d4}, {0x3}, {0x3, 0x2, 0x9}, {0xa, 0x5, 0xa8}, {0xd, 0x5, 0x2}]}, @union={0x6, 0x1, 0x0, 0x5, 0x0, 0x1, [{0x0, 0x4, 0x1000}]}, @datasec={0xe, 0x3, 0x0, 0xf, 0x2, [{0x2, 0x1, 0x1ff}, {0x3, 0x5, 0x10001}, {0x4, 0x3, 0x3}], "f1da"}, @datasec={0xd, 0x8, 0x0, 0xf, 0x3, [{0x1, 0x8c, 0x3}, {0x2, 0xb86, 0x10000}, {0x4, 0x9, 0x9}, {0x1, 0x0, 0x3}, {0x3, 0x1, 0x4}, {0x3, 0x0, 0x4}, {0x5, 0xa7e, 0x9e}, {0x1, 0x0, 0x4}], "50ad81"}, @func={0x2, 0x0, 0x0, 0xc, 0x4}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x36, 0x0, 0x6c}]}, {0x0, [0x5f, 0x1f, 0x30]}}, &(0x7f0000000580)=""/178, 0x155, 0xb2, 0x1}, 0x20) r3 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x303000) ioctl$EVIOCGABS0(r3, 0x80184540, 0x0) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa04, 0x0) 00:58:03 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) pipe(0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x5a, 0x7d, 0x0, {0x0, 0x53, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3, '9p\x00', 0x0, '', 0x13, 'bdev,securitysystem', 0xa, '/dev/ptmx\x00'}}, 0x5a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xa, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000118080000008100000000000000", @ANYRES32=0x0, @ANYBLOB="000000000040000008001a000400020008001b000000000047e4ee84ad37a874b86d77665776ca98c887e8093b4c34c565b55ec57de34d27a8d726570713256f2d3ce8a657b9a5e18e58060e770f32bc4583a7ca136b470e0cb29ae8c4a45972d223e0f985d349974638cede051897d73004a8f30997c5018e4619b487af7f79d8b9497954"], 0x30}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000180)={[0x0, 0x2000, 0x7800, 0x100002], 0x81, 0x80}) r3 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) [ 456.087394][ T8794] IPVS: ftp: loaded support on port[0] = 21 00:58:03 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x6}, 0xfffffffffffffe7f) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff56) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x5bd, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000040), 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="f684e60e59c661edf365a431af397042d3ad38feff9632ad69392ea64b7ade327892d29b5f92c63b5347cad0630d8d145b4a1e3fadb8ed172864ffea0a093958d8e5fb5f487a046c1bc5bb684e3b78ce7edc4ea79f334201ac3ef90eb32029225fdd32bd07", 0x65}, {&(0x7f0000000240)="b2e0942a7af973904869296e3543578a125b957c15bfc0b58b72b5fe87e44e0cbf1f7d7a85fef750d0", 0x29}, {&(0x7f0000000480)="7ad9fcdeaec8333417fce3adfcc88b2b19ee27020635cf22320ec10916e08991020d4a7963ac0527a4b855e3968ab5c312e9d9244ef917940e51895e2474dd7be35aa47623b6de9da4b76786d76287ce8243c646896e04fa9d13a0f5f6a84e522ba12002bed67d502bb493de5942a542fe89d714c22aec1e50550983237774067c7d27074dc6a629317d5a9d174bcfceb4ecae0f8b5c00a752f02c4f19fed791a7b06c", 0xa3}, {&(0x7f00000006c0)="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", 0x1000}], 0x4, &(0x7f00000002c0)}, 0x448f1) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xfffffffffffffd85) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2080, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000140)={r6}, &(0x7f0000000180)=0x8) [ 456.255729][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:04 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x200, 0x80400) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) r2 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mISDNtimer\x00', 0x68400, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) listen(r0, 0x0) unshare(0x40000000) r3 = accept(r0, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) ioctl$sock_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000080)) 00:58:04 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0xc7c8f06784dca8e9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x1f, 0x81, 0x66, 0x0, 0x230f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}, 0x20001, 0x739, 0xa4, 0x1, 0x1ff, 0x400, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x5) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 456.491784][ T8816] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 456.550954][ T8825] IPVS: ftp: loaded support on port[0] = 21 [ 456.760414][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:04 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) pipe(0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x5a, 0x7d, 0x0, {0x0, 0x53, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x3, '9p\x00', 0x0, '', 0x13, 'bdev,securitysystem', 0xa, '/dev/ptmx\x00'}}, 0x5a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xa, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000118080000008100000000000000", @ANYRES32=0x0, @ANYBLOB="000000000040000008001a000400020008001b000000000047e4ee84ad37a874b86d77665776ca98c887e8093b4c34c565b55ec57de34d27a8d726570713256f2d3ce8a657b9a5e18e58060e770f32bc4583a7ca136b470e0cb29ae8c4a45972d223e0f985d349974638cede051897d73004a8f30997c5018e4619b487af7f79d8b9497954"], 0x30}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000180)={[0x0, 0x2000, 0x7800, 0x100002], 0x81, 0x80}) r3 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) [ 457.315107][ T8835] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 00:58:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0xc7c8f06784dca8e9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x1f, 0x81, 0x66, 0x0, 0x230f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}, 0x20001, 0x739, 0xa4, 0x1, 0x1ff, 0x400, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x5) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:58:11 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0xc7c8f06784dca8e9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x1f, 0x81, 0x66, 0x0, 0x230f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}, 0x20001, 0x739, 0xa4, 0x1, 0x1ff, 0x400, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x5) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:58:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x3}, 0xc7c8f06784dca8e9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xc5, 0x1f, 0x81, 0x66, 0x0, 0x230f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}, 0x20001, 0x739, 0xa4, 0x1, 0x1ff, 0x400, 0x7f}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x5) pipe2$9p(&(0x7f0000000140), 0x4000) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:58:11 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x6}, 0xfffffffffffffe7f) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff56) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x5bd, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = io_uring_setup(0x40000000e, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, [], {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000040), 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$kcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="f684e60e59c661edf365a431af397042d3ad38feff9632ad69392ea64b7ade327892d29b5f92c63b5347cad0630d8d145b4a1e3fadb8ed172864ffea0a093958d8e5fb5f487a046c1bc5bb684e3b78ce7edc4ea79f334201ac3ef90eb32029225fdd32bd07", 0x65}, {&(0x7f0000000240)="b2e0942a7af973904869296e3543578a125b957c15bfc0b58b72b5fe87e44e0cbf1f7d7a85fef750d0", 0x29}, {&(0x7f0000000480)="7ad9fcdeaec8333417fce3adfcc88b2b19ee27020635cf22320ec10916e08991020d4a7963ac0527a4b855e3968ab5c312e9d9244ef917940e51895e2474dd7be35aa47623b6de9da4b76786d76287ce8243c646896e04fa9d13a0f5f6a84e522ba12002bed67d502bb493de5942a542fe89d714c22aec1e50550983237774067c7d27074dc6a629317d5a9d174bcfceb4ecae0f8b5c00a752f02c4f19fed791a7b06c", 0xa3}, {&(0x7f00000006c0)="a7314d584b36616dbc66f19f2cc27c253b5157df52df346e4341f3ff081f4b511f31c3bc7506847c6f6c647795165bd265286cc55046e162413ee7ef93a74fefe03e89d8aab64a432bda0c5b80f10193991059ebbe6a4394a423335cfc319437417fd52f3cae0d9eaedeb581f68365e08f3c355023c9161d279309e26308ea64c354fd2dbbcf74a344246bf16a0a9146d21d121fabf729dc8c54f7be4a24a60aa50fd6e153408655639c740458e4322465b1bb4f755f2263ee40eea276c69dbf77be6b7e2df3e781ba8dd6cf15a445457ee9967ae06b849f44e17349a3d05e04ef8e3d114f2821318f9d703aae68138daaa1ddd5f6787f4505102eaef642b9c56fb655a818e7fc99fe1764df21cb2f737fce3d2f4f363e3f701d9315733c85c00bdeefd74449631b7c9c0754ecfc84ef83cf6b33ff49b3bc7a6e029724ff508a78b0a24af8c9d9b4fda0d0ae2be6ee1abf444b16ec05006883d993fa73a955017ea319924397503ef3ed9d37c817f74fa08fba4efdba8a5c464e11f883a3c25fee425c5e7282a749da2f23e40c15e97f8e3e4d71bd03399d117967c37b7c6626c2e8dcd2d53769dfda143945ca0a4324852b0ece3224dbc5f9dd7570e206ad66597cad9ffd7127ad8f072f15a47dfc6ce2aacc2c8844d47013bc9a214979514b6d23a1ec5e77f63a6356ca4d6ef2c97698fddfc66f739cfeac73f815b1d11ff12a4e59455ccddb06148853f5f47fb0bdbf0dcaf59d0e8f4bec29b885e2e0a2acc3ab82d00da979e4816ea76a29366772df5b34f95a68c0d822f91a2f5c3ac22a18b44cc5d11794828a2f5ab0a6b05b5131cba1cf9911c7b045a5513da2f996954b0c9c964d4e72bcce7478c0bdf0cf9152d5836c7178059380e7eca65613691781634b30558137f9c8abc5a70edf7527875b08ada554e5e887c21eb68b5b04c9bd1716f827074764781ed5e8b47d10ff361bd49b3d18cb0e020d7035775e4284a45b5a4a7c40c38aa3ae5f6cf447e63da28fccd069148e4e4198e9921e8fe1bfc1e0d787fcfce718947eae042cdabf24687f434de38753828e5a14157115fc6f856fdf3307f6c8ff9b217750fae4f684a2e69ecea47f31c947022acabc923f287c2b8bf8e9859049d9c3f9ce29272521955a25623c9248bdc6f5b84b3b873b56011c6d83217c9950759334c8976fc76cccf689433e515c9a92b9dd51f35f76cb078773b9b696abc6c7aa847209d16c1663883cebcc8c8ee3da6289ecfd43b1da7042adc7b5d5948230883bd9a2db03ece6ec974b7a083eb168cb42eaa65f69eed82aa601767e08e2895870499d7a75c40d082e03fd2870ca3e0c1848920a7e8ea350ae17328e57befb9f45394c6fade2135fa95804079c09d8b5a7e30fb7a6d580ffed3f53115d697e647df5a8070f70fd0f52958a359af892fc412a819201820c455218844c662e97c8a0de20b439829a933d1157e2bbc1dd10925956a84b500050859c40cc2dc1d17618cf47b8ff22d24957143cbdf6a30673e442477b729244374684d932ccac139042263d04fdd454e0e2ddf7be7b46c36ea9e69ab761f2bb253be6111a577022e6aed2d1a31d36d8d27c11c746e297ef802f6652ab7e30c1e5594a9445700f5281cdb22264b59035a43b082f76adb67c4ab7981465051ca033b269620e8bc9e0c37ce99a02b09bb979f93f123e2f4d88da9612423410c1d1aa9f7c5270e53f3eb6ccd538619bd16426bc20903821d7a5e8469c4db5862f465f90feda3b0065b59e5cb6c285de2e3088ac939338f9e52c9c1b0951add1cd8814077a9cd29a131767e4f6a89192389ee0e19031505b693c08fd173d6239deddf4deb9511a6c5f703d7d87a13de5eddfcd21efb0cf1b6e5aba09375f2977c002aad0531024d68b22b578111d079fdb1288852a0c2db55b0627a5b43b3a7483433413ead3bfbe16673bbea3ca913b04d85af4e06543e39f734db16a6411cc996164cb66965790bb5ae84f598e77cc148be74896dcdd0336050acd083a5dbbb6aca3285d84c9c6234ab0124f08dbd1d2122a76f0bbbfa91e82be146f4810cdb8222d33b0d6be04f7f70c4c9fe4af4a734a0d956c08e053bfa2c7a2c918e93b0c1411ed72f524bb5260e1c2e87751a16d1bdeaa0a0718ed6930f78803152b73b758d68923129c1b823e9ce5b883c771dfd6b71704a20d9cd8202faf7600262035884cf8131e890f560981414986eb444c3d874de2c0ee23451418208d3e481265eccd0c74000e3999d2d7b0b13f6e9975cf543f5b89ab1d688764dff9a31f89ab2165a00a77735b4c23a606c56975bc0e1780466acc8e819b27fa94154b15e13c545df635ac9204b4158b1cf82263339fe3b97808238dfb972f3f2b97d4010a114bd16b22c8a88916c748300a0d373210978f801f1bff0f8991f397ad0669cd8df84e10880a1230cb053190e6136646a68a9f3efbf6b956f47827729e4b63df0b59a4582ab279efa5416f7ac42ece7971b04f191de8a3db379c177ad64d7d6d42a0cd470c1993e1ce2cace12305c5c62c3051169c6142eaa35dd4af28ec9389428975336a75874cda8eed04e8d79cf8845b456c884c4060b53f4f1e8fff0d1a8aabcd85271ec153d9e371cee2121d7643ed9961a0adf9f36535ede0025f103b218ad7cfdc2d23bf34cf6c5a878a3557278c02f6d25ad2dc985420be4428a2539903f53a988438edf2d8a48236523003c109754ca604c7015e6f1fc27c219a243549b30d892cf9181d4ca751489e73dc1d99d0fc774f7e03903e6dfc6b4481bb7544ab7953dfd91677c55096613e426da6e7ec2e76cbeeb2a318b69bf5f7df00a80a5605d5528774b1dcc781011617776af2a23a3408b5b0f5b00e78b422e9852614d8ac9ee6afc725e8af6682b21f507f6c17be02cbc2b1638c411b2933d37de8596401ed5b6639e2b0a97394d83707d3501fe23b4ac947eea231b71cd113a90c9549b762ad0792c196013896e0a17a356856d78d3f0c2b83d16b74e40d85d4ce1977bc733cc97c31021ba664cad1f012d8a1dc71e9cafcdf637fe25baeaa6adf748416155b6929e619966a442f6cee902050d7fb86a87d020af831c07e6596f08e16ea4cb53d60d43620d101eabb10f38a890f963549629f812ca1f467271ffe823adb73eaabcb2637453366e0018fd2f68a1545e261743d715a65e2771f7ec203de21db09cfa2c72f35afbe592b7ee361825e29624e1fa4f0075e55022129c23c5ec403dc92cb783de01885ec55f91cb594f8c89df63859197f5c6deb80ad48ce7d9fc815fb8eb7951d282f8f7a790888985ff8a6b15ab2092248bef7b8436177a84994b53a6f885e1df5e5ea4b84595caf66a005893f2fd811d886144de31a03b062f12020da5830b28f7aa9d4b2052030141db6266cd905b14393f7531479870c0c51f935a58bcc6767baf8a72fc624e00d6255bc1e68353826695249f79a5ea677f6bdda826173d9db43def5a88389efb69846a8a395c11722301226dd9acb5a663dbaf47d320bdcb32b2abe4fac00780c3546c7432046f5895b08349a93c731229a7ecf534de1f390b8137ae08738508526a20a2e12e6f1b1d1597d61c8966e0c8b237a6b6b4c4250fdc9de3ec39339d61481e0230ae53a4c5d07a7ca3ec72fe8d7a1b46dfea9b0e19aaf59269534fdf46ab6c79fa66d3113200e8f22835e8d6db27f1b6237798a245ed66e223603b1dd5249652f1f96d6d118cf6f719832094d4d4fcdaf27de3f938ba664cd5032c1b32eb3d28467994bdbc24d27bd0c69211d6f84ef081c8379451bcaff2664996947561a402448bc848439cda1b4c40fdc42bb6ae87db56a6dce060bcc7f5ff03634b603e85d53cce8bde9c9b2c4c1fb4563f361c3daa5b1687bec010238b53ca7cb4f07b6d4e0b1ee3862d6959ec330168e679f6fad5db6b03ab9c8f7c5bbe39f2ca943fcd25e4613b40f1da96a6f9e239d3a6302de6432b8f39c8d6971ec52a60441d5851aed98ed36b825e9dcc1fd6eacc1c04d065a4f19a02c5e9779c1c9dd75ca3816f1df580f9258b92e1c2a7356d8fd3a598fcedc1def6c4b8d728306bdb6d0009fbf533fd8e0267f00315f94c8b5bae415de6dffaf5cbe6dc98c272d2ad2eb438826c8a73aad7e0b53ac9cced18ac92a41891985c27a6b3dc62f45a4c819c321dfa2123fcb383dd30e609d0de2fefd908ac98265b1696f8452fb1073767c4844a91855c643f4e354efe78310532754d7dd408e055c6267bd7cb7e4f210631a1acd9de056f5fc733f157cc0c148f8c585ad41a14819a83009055bc3a43e79e423bdd7e396dc1a8c03bf9123615a95e983c55d453721579204c52df45f54bbe4e20698a07b54e806c36a033c46b8e4be3552b725ca4c1961777495dd3a09a4f288036d4d4fd974a861f92a40f2ec77f49a8c64d2d3e8c7a6d29ab5547bf87c7a08696b76c08eef48e9ac5609f21249da4b6b0a0b9590d5aa05bec3c5986bdd379a071fc3a74b0d6365380754571501739fb086cf7888d55cd831e8e199c23c4191c9e8f74b98e289fb60498ed2127a99de83161b9c632a0eabf644644feb354763c0a9605937ca38dff6ea2e1ac1c3cc15f4d1f79559ce9a47223f1945c381da275c45dadae11eaf8e7a8821050f80e70923ea20599c11c772667a152a099e1306a9f5fd25cc5276d2beca6b9fe7f9e4cca073425164e32558831f825a951199d2e1182a2df50b2045c8872939c3481ca8bdac4a09f741e908fc1f3fe31208eb750933691302aef0f71638c6f4c8714362366124fe89923ca026b40ddf1f95baf06ceaaae687f8e44f3d0954781832e07de7cd9d2eb32a7cb15a98a8b0f6531e5f6559a2f8cc48fa93e27fc134452c9d84a1626fdc48786bfadffad031cce03a8a908fdedf0be08f8af45b5b3871bf769b2097c4153a042d176ee4504c89e37a389ed655f47d8aaa0fdd56d82d05a51a5c412da910b5f538026b1e1858ecac07543cbc793142d8d9edf4be0eebcf8dab1cb076ca9c554c5c75bebf2dea1fd3a1c6ac352aeb91d9e5d5d30488f828072f9dd02c5aaf8f3bd6c8cece3ee11c2f3e8ee5f63985454837153f062fd581eae976136f1d868f5cc89dfcad79399cdd62ea459d023f056a80ff84bce187dbd78d98b7aa7b82bc33b8f653d9dc046dac95013a19f701191696fc32491568750919804eb222cc3d1afcaa7c3169a833fd15e7168749f217b9ede6b596de6194b58971178b23ee122dc06f28bfb9cbd838b5a1f1eeb24851f1d9642520ecbda9c07ac6ee6362c7a6b1b3294049d653b5ecc7df069757530483edda6d77d66295632ee643a96be5ca278f68d2a2ef430a3c3f227b05d5f51d195b7109bf752d5a604bb8db0c3501079fb10bd6d558d027101e7404a8c1627fde48bdbf4d924064b9b224ddc7d28e16a085db193754732d706aef473085917ac81accb3fce9ffa5e8453260dc8c9353df8f5a55594bf3575c1145bced49ffa53eeb42251eb389ba84e785d565f69f50ccdce6799ae7eb26efde378eb5d048d5330576c0be78c3fe527936747c6a5ce43f6e191bb4a4ab790fdbfa9879e017d75d5fc531a66b2cf150a5d2936091403301c2ea06f479f069802b92a4819f259d0225d6a7efb3823c1b9beb0316ed3cdb8e91001932000b5364b1e7b09949eabf8b01f13394c1ef869569aeada4c60b7d813547721628cdb5b4c3943fe6a2382ec5ba71e893d63570a8c0e184eae21d6d89143a6bdaf1420e94eadb48b9eb41e2962aa566310e", 0x1000}], 0x4, &(0x7f00000002c0)}, 0x448f1) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xfffffffffffffd85) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2080, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000140)={r6}, &(0x7f0000000180)=0x8) 00:58:11 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x81000008912, &(0x7f00000002c0)="11dca50d5e0bcfe47bf070") r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f00000000c0), 0x10) recvmmsg(r2, &(0x7f00000031c0)=[{{0x0, 0xffffffffffffffa8, 0x0, 0x0, 0x0, 0xffffff10}}], 0x2, 0x0, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100, 0x0) mmap$xdp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1c, 0x13, r3, 0x180000000) 00:58:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000080)=0x3) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {0x2, 0x3}], {0x4, 0x7}, [{}, {}, {}]}, 0x4c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x280040) mkdirat$cgroup(r3, &(0x7f0000000540)='syz1\x00', 0x1ff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc0000012}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x104, 0x0, 0x400, 0x0, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfe}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffc1}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2002}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3070}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49e}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0xfffffffffffffed1, 0x4, {{0xfffffffffffffe96, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @remote, 0xfff}}}}, @TIPC_NLA_BEARER_PROP={0xffffffffffffff59, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x880}, 0xd4) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000140), 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 464.400386][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 464.427293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 464.497513][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = perf_event_open$cgroup(&(0x7f0000001600)={0x3, 0x70, 0x9, 0x8c, 0x93, 0x8, 0x0, 0x1000, 0x60010, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000280), 0x8}, 0x30018, 0x2, 0x100, 0x4, 0x200, 0x3, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x2) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000001680)='trusted.overlay.opaque\x00', &(0x7f00000016c0)='y\x00', 0x2, 0x1) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1c00}], 0x1) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r6 = creat(0x0, 0x1) fsetxattr(r6, 0x0, &(0x7f0000000080)='/dev/nbd#\x00', 0xa, 0x0) ioctl$RTC_AIE_OFF(r4, 0x7002) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) writev(r7, &(0x7f0000000240)=[{&(0x7f0000000180)="f6159f5d6b957a4410ad9ab6d4df2431268086021540df4177ffe8d12099225445a2c4b00db3d8", 0x27}, {&(0x7f0000000500)="64bf75ab98c8fd02db6cb54c1a2a3987f0c66d010078a73a5731246ca7696322d49052d8ee7a2cf75bb950f27ed2a3fcab21c61cd94b43ac2c7bac9ab4f65d9e8684a1852713ffb97dd3e278416c58226dba88070632dbc3a1e0f87e60d3121572c3766452e49ef94955c286b1df392bb31ee3179992afd2f2ccbf1105fb1aa50f295b3eb61a0f2fe75647a9fb93b4e52fa1448afb6bc6b4f0f794e7254350e2f231a82973da599d23abef413842b95ed47bd601f211c1bb52576977ab7bb2b7", 0xc0}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f00000001c0)="971dddf594a8149156f72014d49220f15764ca24cbc88e6608db343fe8683c46135114f5412fe7989c6034f125690f", 0x2f}], 0x4) bind$inet(r6, &(0x7f0000000140)={0x2, 0x4e22, @multicast1}, 0x10) r8 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004], 0x12000}) ioctl$KVM_RUN(r8, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000380)={@in={{0x2, 0x4e20, @multicast2}}, 0x0, 0x0, 0x0, "58872a88b8b4e6610fcdac15c1b954b54a34194b1545b9365986f3e36b04f618df4a0c105eeb9d70f40c1f04d50bb261ff8710dbcaf12a1582c99bd01e3d7a75037313cd58364bca5bce853694306211"}, 0xd8) 00:58:12 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x119) keyctl$set_reqkey_keyring(0xe, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000003440)="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", 0xdc1}], 0x1) write$P9_RFLUSH(r1, &(0x7f0000000340)={0xffffffffffffffbc}, 0x12a) sendfile(r0, r1, &(0x7f0000d83ff8), 0x40008000ffffdffe) 00:58:12 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x8010000400000084) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r3}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000200)=0x24200, 0x4) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r6, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x88c8]}, 0x45c) fallocate(r6, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x0, 0x8, 0x20}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000180)={{0x1, 0x40}, {0x6, 0x9}, 0x2, 0x2, 0x6}) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x2ac}}, 0x1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003080)={0x0, 0x0, 0x2080}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) fcntl$setlease(0xffffffffffffffff, 0x10, 0x70e000) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r9, 0x0, 0x40000000, 0x10000101) [ 465.019769][ T8869] UHID_CREATE from different security context by process 167 (syz-executor.2), this is not allowed. [ 465.031091][ T44] hid (null): invalid report_count 673905898 [ 465.041954][ T44] hid (null): unknown global tag 0x78 [ 465.065783][ T44] hid (null): invalid report_count -1740081149 [ 465.086083][ T44] hid (null): unknown global tag 0xe [ 465.119980][ T44] hid (null): unknown global tag 0xe [ 465.145785][ T44] hid (null): unknown global tag 0xe [ 465.155597][ T44] hid (null): unknown global tag 0xe [ 465.166548][ T44] hid (null): unknown global tag 0xc [ 465.178626][ T44] hid (null): unknown global tag 0xd [ 465.188446][ T44] hid (null): unknown global tag 0xe [ 465.201862][ T44] hid (null): unknown global tag 0xd4 [ 465.215014][ T44] hid (null): invalid report_count 35466 [ 465.223254][ T44] hid (null): unknown global tag 0xe [ 465.231218][ T44] hid (null): unknown global tag 0xc [ 465.247875][ T44] hid (null): report_id 11244 is invalid [ 465.260367][ T44] hid (null): unknown global tag 0xe 00:58:13 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x20000000000001) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=r0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2008d000000aaaaaabb080045000030000000000067907800000000ffffffff21009078000000003e000024000000e4ffffff00ac14ffbbe0000001"], 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x9, 0x608701) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f0000000200)) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) [ 465.270441][ T44] hid (null): unknown global tag 0xd0 [ 465.280535][ T44] hid (null): bogus close delimiter [ 465.286047][ T44] hid (null): invalid report_count 50888 [ 465.291958][ T44] hid (null): unknown global tag 0xc [ 465.316132][ T44] hid (null): unknown global tag 0xd [ 465.323867][ T44] hid (null): bogus close delimiter [ 465.373514][ T44] hid (null): invalid report_size 7181 [ 465.421620][ T44] hid (null): unknown global tag 0x78 [ 465.460809][ T44] hid (null): usage index exceeded [ 465.489476][ T44] hid (null): usage index exceeded [ 465.517150][ T44] hid (null): unknown global tag 0xa9 [ 465.531521][ T44] hid (null): unknown global tag 0xd [ 465.555675][ T44] hid (null): unknown global tag 0xe [ 465.564412][ T44] hid (null): unknown global tag 0x69 [ 465.574408][ T44] hid (null): unknown global tag 0xc [ 465.583351][ T44] hid (null): unknown global tag 0xc [ 465.593221][ T44] hid (null): unknown global tag 0xd4 [ 465.603112][ T44] hid (null): report_id 0 is invalid [ 465.614098][ T44] hid (null): invalid report_count -1571276408 [ 465.631043][ T44] hid-generic 0000:0000:0004.0001: invalid report_count 673905898 00:58:13 executing program 3: mlockall(0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r3, 0x0, 0x0, 0x110001) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000001c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r6, 0x0, 0x0) fallocate(r6, 0x0, 0x40000, 0x4) fallocate(r5, 0x0, 0x0, 0x110001) fdatasync(r6) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0xd000000, r6, 0x0, 0x8}) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ff911e4551db2bdd23fa4e07f874d611f1fe0febc11962e4424df0c4c30dd5ae83619450c27fe9a6be1fd44a97fc2bf043dfe5d7416cbed8a235adc2877f407e6a10015c69139b65de2069b28e8410aa660a20c617f44d5ac3d79ac8b4aa5893119c0e7085291b364b6952b91ab2861ccc6f42ae5f84aea6e405b848055f0cc816e9eef2767a801f42fbdfc5cfcb3871c9711bf2a36d1412827af1904c92efcdff73f692af0fc78e11f23f4a1e2a76", @ANYRES16=r4, @ANYBLOB="02002abd7000fddbdf25050000001c00070008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x400d080) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22000200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r7 = dup(r0) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x66, 0x4a0100) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mremap(&(0x7f00004f7000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00004f4000/0x4000)=nil) [ 465.659542][ T44] hid-generic 0000:0000:0004.0001: item 0 4 1 9 parsing failed [ 465.686417][ T44] hid-generic: probe of 0000:0000:0004.0001 failed with error -22 [ 465.702821][ T25] audit: type=1804 audit(1572483493.465:48): pid=8887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir838502221/syzkaller.1TnuV4/41/file0" dev="sda1" ino=16788 res=1 [ 465.841901][ T25] audit: type=1800 audit(1572483493.565:49): pid=8888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16787 res=0 00:58:13 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x20, 0x90, 0x1000, 0x2}, &(0x7f0000000100)=0x98) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r4, 0x0, 0xfffffffe, 0x4, 0x401, 0x9, 0x1ff, 0x7, {r6, @in={{0x2, 0x4e23, @rand_addr=0x7}}, 0x10000, 0x8, 0x0, 0x0, 0x2f2}}, &(0x7f0000000180)=0xb0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 466.028455][ T25] audit: type=1800 audit(1572483493.585:50): pid=8873 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16785 res=0 00:58:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x8}, 0x28, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xffffffffffffffc1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f00000003c0)=""/154) 00:58:13 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x8010000400000084) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r3}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000200)=0x24200, 0x4) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r6, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x88c8]}, 0x45c) fallocate(r6, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x0, 0x8, 0x20}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000180)={{0x1, 0x40}, {0x6, 0x9}, 0x2, 0x2, 0x6}) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x2ac}}, 0x1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003080)={0x0, 0x0, 0x2080}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) fcntl$setlease(0xffffffffffffffff, 0x10, 0x70e000) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r9, 0x0, 0x40000000, 0x10000101) [ 466.100506][ T25] audit: type=1800 audit(1572483493.595:51): pid=8883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16785 res=0 00:58:14 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x20000000000001) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=r0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2008d000000aaaaaabb080045000030000000000067907800000000ffffffff21009078000000003e000024000000e4ffffff00ac14ffbbe0000001"], 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x9, 0x608701) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f0000000200)) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) 00:58:14 executing program 5: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x20000000000001) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=r0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2008d000000aaaaaabb080045000030000000000067907800000000ffffffff21009078000000003e000024000000e4ffffff00ac14ffbbe0000001"], 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x9, 0x608701) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f0000000200)) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) 00:58:14 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') sendfile(r1, r1, 0x0, 0x20000000000001) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=r0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r2 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='./file1\x00', 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2008d000000aaaaaabb080045000030000000000067907800000000ffffffff21009078000000003e000024000000e4ffffff00ac14ffbbe0000001"], 0x0) mkdirat(r2, &(0x7f0000000380)='./file1/file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x9, 0x608701) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f0000000200)) renameat2(r2, &(0x7f0000000000)='./file1/file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x2) [ 470.583481][ T8939] overlayfs: conflicting lowerdir path [ 470.703079][ T8940] overlayfs: workdir and upperdir must reside under the same mount 00:58:19 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lstat(0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000080)=0x3) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {0x2, 0x3}], {0x4, 0x7}, [{}, {}, {}]}, 0x4c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x280040) mkdirat$cgroup(r3, &(0x7f0000000540)='syz1\x00', 0x1ff) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x2f, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc0000012}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x104, 0x0, 0x400, 0x0, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfe}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffc1}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2002}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3070}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49e}]}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0xfffffffffffffed1, 0x4, {{0xfffffffffffffe96, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @remote, 0xfff}}}}, @TIPC_NLA_BEARER_PROP={0xffffffffffffff59, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x880}, 0xd4) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000140), 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 00:58:19 executing program 2: socket$alg(0x26, 0x5, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x20, 0x90, 0x1000, 0x2}, &(0x7f0000000100)=0x98) r5 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r6, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r6, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000003c0)={r4, 0x0, 0xfffffffe, 0x4, 0x401, 0x9, 0x1ff, 0x7, {r6, @in={{0x2, 0x4e23, @rand_addr=0x7}}, 0x10000, 0x8, 0x0, 0x0, 0x2f2}}, &(0x7f0000000180)=0xb0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x200000000, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) 00:58:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x8010000400000084) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r3}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000200)=0x24200, 0x4) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r6, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x88c8]}, 0x45c) fallocate(r6, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x0, 0x8, 0x20}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000180)={{0x1, 0x40}, {0x6, 0x9}, 0x2, 0x2, 0x6}) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x2ac}}, 0x1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003080)={0x0, 0x0, 0x2080}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) fcntl$setlease(0xffffffffffffffff, 0x10, 0x70e000) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r9, 0x0, 0x40000000, 0x10000101) 00:58:19 executing program 3: mlockall(0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x20000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r3, 0x0, 0x0, 0x110001) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000001c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r6, 0x0, 0x0) fallocate(r6, 0x0, 0x40000, 0x4) fallocate(r5, 0x0, 0x0, 0x110001) fdatasync(r6) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0xd000000, r6, 0x0, 0x8}) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="30ff911e4551db2bdd23fa4e07f874d611f1fe0febc11962e4424df0c4c30dd5ae83619450c27fe9a6be1fd44a97fc2bf043dfe5d7416cbed8a235adc2877f407e6a10015c69139b65de2069b28e8410aa660a20c617f44d5ac3d79ac8b4aa5893119c0e7085291b364b6952b91ab2861ccc6f42ae5f84aea6e405b848055f0cc816e9eef2767a801f42fbdfc5cfcb3871c9711bf2a36d1412827af1904c92efcdff73f692af0fc78e11f23f4a1e2a76", @ANYRES16=r4, @ANYBLOB="02002abd7000fddbdf25050000001c00070008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x400d080) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22000200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x800) r7 = dup(r0) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x66, 0x4a0100) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mremap(&(0x7f00004f7000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f00004f4000/0x4000)=nil) 00:58:19 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x8010000400000084) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r3}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000200)=0x24200, 0x4) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r6, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x88c8]}, 0x45c) fallocate(r6, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x0, 0x8, 0x20}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000180)={{0x1, 0x40}, {0x6, 0x9}, 0x2, 0x2, 0x6}) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x2ac}}, 0x1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003080)={0x0, 0x0, 0x2080}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) fcntl$setlease(0xffffffffffffffff, 0x10, 0x70e000) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r9, 0x0, 0x40000000, 0x10000101) 00:58:19 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) syz_open_dev$media(0x0, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x0, 0x8010000400000084) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000000)={r3}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000200)=0x24200, 0x4) fcntl$setlease(r2, 0x400, 0x0) fcntl$setlease(r2, 0x10, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r6, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x88c8]}, 0x45c) fallocate(r6, 0x0, 0x0, 0x2000002) fallocate(r5, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000040)={0x0, r6, 0x0, 0x8, 0x20}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r5, 0x40505330, &(0x7f0000000180)={{0x1, 0x40}, {0x6, 0x9}, 0x2, 0x2, 0x6}) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r7, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="ac020000", @ANYRES16=0x0, @ANYBLOB="000425bd7000fddbdf2514000000cc000500080001006962000008000100696200001c000200080001000e000000080001001a00000008000300000000003c00020008000200fcffffff0800030000fcffff0800040006040000080001001b000000080002000000010008000400ff0f000008000300c17a00001c00020008000300050000000800040003000000080003000200000008000100756470003c00970008000400ff7f00000800010011000000080004002705000008000400020000000800030003000000080003008a2b0000080002001b000000240007000c000400080000000000000008000100050000000c000400220f000000000000b200090008000100400000000800010001000000180105002c000200080004000300000008000300010000000800040001000000080001001200000008000400faffffff3c000200080002000000000008000100180000000800030008000000080001001a00000008000400060000000800020008000000080004000600000024000200080003000100000008000300ffffffff080002000700000008000400ff7f0000080001006574680044000200080001001c000000080002000300000008000300ffff000008000300ffffff7f080003000900000008000100030000000800040009000000080002000000000008000100696200000800010075647000080001006962000024000200080003006bca000008000200350000000800010014000000080001000a0000001c000900080001000100000008000100003800fa07000200099af3dd03b817a7f30003000700000008000300fbffffff38000500340002000800010015000000080001001a00000008000200ff0100000800010008000000080003000200000008000400040000001400010008000300000000000800030080000000"], 0x2ac}}, 0x1) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000003080)={0x0, 0x0, 0x2080}) pwritev(r1, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x42000) fcntl$setlease(0xffffffffffffffff, 0x10, 0x70e000) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) fallocate(r1, 0x20, 0x0, 0xfffffeff000) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90}, 0x90) r9 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r9, 0x0, 0x40000000, 0x10000101) 00:58:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) 00:58:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x83000000, 0x61, 0x11, 0x1a001000000}, [@ldst={0x6, 0x5, 0x3, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0x10}, 0x70) 00:58:20 executing program 5: connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff]}}}}, 0x48) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/55, 0x37}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000500)=""/243, 0xf3}], 0x3) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='\xe3\xff\xff\xff\xff\xff\xff\xff\x00', 0x1, 0x0) accept$packet(r1, 0x0, &(0x7f00000002c0)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x8, 0x2, 0xd000}, 0x4) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x2000000, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000180)={@local, 0x800, 0x0, 0x3}, 0x20) setsockopt$inet6_opts(r5, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000200)=0x4) 00:58:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='mem\x833y.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xcbaa60f5) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) r6 = getgid() setresgid(r4, r5, r6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) 00:58:20 executing program 1: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4048ae9b, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0xaaaaaaaaaaaae2f, 0x0, 0x0, 0xffa3) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, {}, {0x4}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl(0xffffffffffffffff, 0x8936, 0x0) 00:58:20 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") dup(r4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="a61c67671b514730077866400000001000050700fdb0bf4cdddf3dc1a9ee38f0c515aa03875c2f70ce936b391c3b4277ce994c74bc9b6a66a94dba912b9df59ee8645f836c0320d319a82f7e2f8108baf018e653822c87502a902c11926e55e94283e2a83a65b79b772adcda4070ff7583f9da1a0198fd9f0f30ee5b0540565656ff4d823b947255563d979c87950fac0f71351f", @ANYRES32=0x0, @ANYBLOB="e1dbfd330000000020001200100001006970366772657461700000000c00020008000100", @ANYRES32=r7], 0x40}}, 0x0) [ 474.525859][ T7436] device bridge_slave_1 left promiscuous mode [ 474.532111][ T7436] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.575610][ T7436] device bridge_slave_0 left promiscuous mode [ 474.581797][ T7436] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.385109][ T7436] device hsr_slave_0 left promiscuous mode [ 475.455078][ T7436] device hsr_slave_1 left promiscuous mode [ 475.523553][ T7436] team0 (unregistering): Port device team_slave_1 removed [ 475.534542][ T7436] team0 (unregistering): Port device team_slave_0 removed [ 475.546987][ T7436] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 475.579452][ T7436] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 475.661352][ T7436] bond0 (unregistering): Released all slaves [ 482.333221][ T8997] overlayfs: conflicting lowerdir path 00:58:30 executing program 0: r0 = semget(0x2, 0x4, 0x0) semctl$GETPID(r0, 0x0, 0x4, 0x0) 00:58:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff, 0x8, 0xffffffffffffff0d, &(0x7f0000000000), &(0x7f0000000040)="a46d226dd5d803c685b2f4975fbd0d1fdf1e64855a52bc1bf010e648fe9dfcf63d185dba15e3054eb3d3c02d82089a05036bb2acf3469fc0872546bab313270778cf2c96362bda1c6fca23e0f5c5ef8401"}, 0x40) 00:58:30 executing program 5: connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff]}}}}, 0x48) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/55, 0x37}, {&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000500)=""/243, 0xf3}], 0x3) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='\xe3\xff\xff\xff\xff\xff\xff\xff\x00', 0x1, 0x0) accept$packet(r1, 0x0, &(0x7f00000002c0)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0x8, 0x2, 0xd000}, 0x4) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x2000000, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000180)={@local, 0x800, 0x0, 0x3}, 0x20) setsockopt$inet6_opts(r5, 0x29, 0x3b, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) getsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000200)=0x4) 00:58:30 executing program 3: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x20, 0x2, 0x5, 0x7, 0xffffffff}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c594512634c060cfb6b72c3c922835d2b5fe1600c22b487813885"], 0x35) close(r3) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) getpid() getpid() finit_module(0xffffffffffffffff, &(0x7f0000000000)='security/(\x00', 0x6) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x8}) 00:58:30 executing program 1: socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4048ae9b, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0xaaaaaaaaaaaae2f, 0x0, 0x0, 0xffa3) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, {}, {0x4}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl(0xffffffffffffffff, 0x8936, 0x0) 00:58:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") dup(r4) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="a61c67671b514730077866400000001000050700fdb0bf4cdddf3dc1a9ee38f0c515aa03875c2f70ce936b391c3b4277ce994c74bc9b6a66a94dba912b9df59ee8645f836c0320d319a82f7e2f8108baf018e653822c87502a902c11926e55e94283e2a83a65b79b772adcda4070ff7583f9da1a0198fd9f0f30ee5b0540565656ff4d823b947255563d979c87950fac0f71351f", @ANYRES32=0x0, @ANYBLOB="e1dbfd330000000020001200100001006970366772657461700000000c00020008000100", @ANYRES32=r7], 0x40}}, 0x0) 00:58:30 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='b'], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 00:58:30 executing program 4: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x4440) [ 482.701697][ T25] audit: type=1800 audit(1572483510.465:52): pid=9009 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16487 res=0 00:58:30 executing program 1: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) 00:58:30 executing program 4: mlockall(0x8) 00:58:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:58:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000540)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) [ 484.843099][ T9038] IPVS: ftp: loaded support on port[0] = 21 [ 484.903698][ T9038] chnl_net:caif_netlink_parms(): no params data found [ 484.934681][ T9038] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.941807][ T9038] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.952791][ T9038] device bridge_slave_0 entered promiscuous mode [ 484.960495][ T9038] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.967690][ T9038] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.975689][ T9038] device bridge_slave_1 entered promiscuous mode [ 484.995153][ T9038] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 485.005974][ T9038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 485.025556][ T9038] team0: Port device team_slave_0 added [ 485.032395][ T9038] team0: Port device team_slave_1 added [ 485.108324][ T9038] device hsr_slave_0 entered promiscuous mode [ 485.145355][ T9038] device hsr_slave_1 entered promiscuous mode [ 485.184944][ T9038] debugfs: Directory 'hsr0' with parent '/' already present! [ 485.199426][ T9038] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.206501][ T9038] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.213804][ T9038] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.220865][ T9038] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.254561][ T9038] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.267330][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.276775][ T7509] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.284621][ T7509] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.293847][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 485.306100][ T9038] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.317633][ T7254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.326165][ T7254] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.333173][ T7254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.344034][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.352996][ T7509] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.360100][ T7509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.377983][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.394783][ T9038] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 485.405647][ T9038] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 485.419159][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 485.427890][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.436957][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 485.445850][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 485.454202][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 485.471485][ T9038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 486.695546][ T7436] device bridge_slave_1 left promiscuous mode [ 486.702045][ T7436] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.735575][ T7436] device bridge_slave_0 left promiscuous mode [ 486.741804][ T7436] bridge0: port 1(bridge_slave_0) entered disabled state [ 487.545211][ T7436] device hsr_slave_0 left promiscuous mode [ 487.585059][ T7436] device hsr_slave_1 left promiscuous mode [ 487.633492][ T7436] team0 (unregistering): Port device team_slave_1 removed [ 487.644465][ T7436] team0 (unregistering): Port device team_slave_0 removed [ 487.655346][ T7436] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 487.688622][ T7436] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 487.771030][ T7436] bond0 (unregistering): Released all slaves 00:58:38 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r1 = shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x3000) shmdt(r1) 00:58:38 executing program 1: r0 = socket(0x80000000000002, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1021, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000080)="ea00000000000000", 0x8) 00:58:38 executing program 4: mlockall(0x8) 00:58:38 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r1 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x44b, 0x800) msgrcv(r1, &(0x7f0000000180)={0x0, ""/226}, 0xea, 0x2, 0x0) msgctl$IPC_RMID(r1, 0x0) 00:58:38 executing program 5: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f0000002440)=ANY=[], 0x0, 0x0) 00:58:38 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:38 executing program 4: mlockall(0x8) 00:58:38 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:38 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180)='3', 0xfffffffffffffd6e}, 0x68) 00:58:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000800010073666200f3303e9728000b00000000000000004fa4c361e8ecefd1a56ca01cc092c400000000000000000000000000000000000000000000004f00000000005fd8ccadf8d3b2c4c976841c21836a89b744c92f5cbcceecd34c48e78dcfa9f0c3ba0b3b20faf7c3ece6c5a9da630abb5e241ac4ab8b6758658b380bf1c8eb7f800a1a71e68709200b691a6108fb2df61e39876996b14f2e46ba5a9bd6eae33730ffc1fe3713abbb06b9ba0c109e8cd779841f7f100000000000000015f928fe171f35e4dd2351a30acc529e53d3044282d2e1e752dd2637516aa6f28ad4bd5f1c9301f51a"], 0x58}}, 0x0) 00:58:39 executing program 4: mlockall(0x8) 00:58:39 executing program 2: migrate_pages(0x0, 0x5, &(0x7f0000000100)=0xdee6, &(0x7f0000000140)=0x81) [ 491.459638][ T9076] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 491.596928][ T9076] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.1'. [ 493.059108][ T9090] IPVS: ftp: loaded support on port[0] = 21 [ 493.119849][ T9090] chnl_net:caif_netlink_parms(): no params data found [ 493.149552][ T9090] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.156819][ T9090] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.164621][ T9090] device bridge_slave_0 entered promiscuous mode [ 493.172709][ T9090] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.179785][ T9090] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.188286][ T9090] device bridge_slave_1 entered promiscuous mode [ 493.207225][ T9090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 493.217930][ T9090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 493.237853][ T9090] team0: Port device team_slave_0 added [ 493.244422][ T9090] team0: Port device team_slave_1 added [ 493.308017][ T9090] device hsr_slave_0 entered promiscuous mode [ 493.345343][ T9090] device hsr_slave_1 entered promiscuous mode [ 493.384994][ T9090] debugfs: Directory 'hsr0' with parent '/' already present! [ 493.399946][ T9090] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.407104][ T9090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.414431][ T9090] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.421562][ T9090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.455831][ T9090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 493.467755][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 493.476567][ T3001] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.484517][ T3001] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.494097][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 493.507446][ T9090] 8021q: adding VLAN 0 to HW filter on device team0 [ 493.518538][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 493.527409][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.534432][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.546548][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 493.555125][ T3001] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.562148][ T3001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.586879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 493.596389][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 493.606324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 493.614648][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 493.626300][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 493.636427][ T9090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 493.653264][ T9090] 8021q: adding VLAN 0 to HW filter on device batadv0 00:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000003180)={'team_slave_0\x00', &(0x7f0000003140)=@ethtool_regs}) 00:58:44 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:44 executing program 4: mlockall(0x0) 00:58:44 executing program 2: migrate_pages(0x0, 0x5, &(0x7f0000000100)=0xdee6, &(0x7f0000000140)=0x81) 00:58:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) migrate_pages(0x0, 0x3, &(0x7f0000000000)=0x7ff, &(0x7f0000000140)=0x81) 00:58:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 00:58:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000001c0)=ANY=[@ANYBLOB="01040000000000000800000000000000040000000500000004"]) 00:58:45 executing program 4: mlockall(0x0) 00:58:45 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:45 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:58:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0xfdb8, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 00:58:45 executing program 4: mlockall(0x0) [ 497.620191][ T25] audit: type=1326 audit(1572483525.385:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9127 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 498.383974][ T25] audit: type=1326 audit(1572483526.145:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9127 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) lremovexattr(&(0x7f0000000040)='.\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00') 00:58:51 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) 00:58:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/netstat\x00') exit(0x0) preadv(r2, &(0x7f0000001300)=[{&(0x7f0000000180)=""/68, 0x44}], 0x1, 0x0) 00:58:51 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:58:51 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 503.489122][ T25] audit: type=1326 audit(1572483531.255:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9146 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 503.542162][ T25] audit: type=1326 audit(1572483531.285:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9145 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 503.577496][ T25] audit: type=1326 audit(1572483531.295:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9147 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:51 executing program 3: msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 504.288469][ T25] audit: type=1326 audit(1572483532.055:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9146 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 504.314024][ T25] audit: type=1326 audit(1572483532.075:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9145 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:52 executing program 2: socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0xc10496740acafe84) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xffffffffffffff7c) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r0, &(0x7f0000000140)=""/4096, 0x1000) [ 509.807087][ T25] audit: type=1326 audit(1572483537.575:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9156 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) 00:58:58 executing program 3: msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 00:58:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:58:58 executing program 5: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000600)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x54, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @exp_fastopen={0xfe, 0x4}, @window={0x3, 0x3}, @md5sig={0x13, 0x12, "d31c8190da8dfe461d135b075be2c1c4"}, @md5sig={0x13, 0x12, "5b3b4bc0ca96fcedefad47a621547516"}, @exp_fastopen={0xfe, 0xc, 0xf989, "908fabfe9a69b583"}]}}}}}}}}, 0x0) 00:58:58 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000002c0)={@void, @val={0x1, 0x1, 0x0, 0xffff}, @mpls={[], @ipv6={0x0, 0x6, "b67d00", 0x10, 0x0, 0x0, @dev, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "9016cc", 0x0, "b75b15"}}}}}}, 0x42) 00:58:58 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(0xffffffffffffffff) dup(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) socket$key(0xf, 0x3, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') getdents64(r1, &(0x7f0000000140)=""/4096, 0x1000) 00:58:58 executing program 3: msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 510.818501][ T9201] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 510.841281][ T25] audit: type=1326 audit(1572483538.605:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9200 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:58:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83420004, r2}) 00:58:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 00:58:58 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:59 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:58:59 executing program 5: clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) 00:59:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r0) 00:59:02 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x801c7011, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:59:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 00:59:02 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) 00:59:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 515.224689][ T25] audit: type=1326 audit(1572483542.985:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9255 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 00:59:03 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:03 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000895b40000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 00:59:03 executing program 4: poll(&(0x7f0000001280), 0x2000000000000006, 0x0) 00:59:03 executing program 2: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setgid(r0) [ 515.605609][ T9274] ldm_validate_privheads(): Disk read failed. [ 515.628237][ T9274] Dev loop5: unable to read RDB block 1 00:59:03 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141442, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(0xffffffffffffffff) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x280080) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 00:59:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141442, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) syncfs(0xffffffffffffffff) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x280080) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) [ 515.658793][ T9274] loop5: unable to read partition table [ 515.680512][ T9274] loop5: partition table beyond EOD, truncated [ 515.698430][ T9274] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 00:59:12 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180), 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4320}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80100, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) unshare(0x20600) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000006023d87f8a13b0e68bc5127254d123f7a74b8a35c4c1ff460d039610c21d8056406e3396d8b72bdc5bfe9b5a8c6c0ef798f3065f82aefc7532b696f09377086e6e37830333fe1"]) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000140)='/dev/loop-control\x00', 0x12, 0x2) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) creat(0x0, 0x0) io_setup(0x40002100000008, &(0x7f0000000100)) r3 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) 00:59:12 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:12 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}]) dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 00:59:12 executing program 2: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141442, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000140)={0x7}, 0x7) syncfs(r0) r5 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r5, 0x280080) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 00:59:12 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000895b40000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 00:59:12 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) [ 524.626727][ T25] audit: type=1326 audit(1572483552.395:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9301 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 524.703957][ T25] audit: type=1804 audit(1572483552.465:64): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/67/bus" dev="sda1" ino=16769 res=1 [ 524.736956][ T9307] ldm_validate_privheads(): Disk read failed. 00:59:12 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 524.753086][ T9307] Dev loop5: unable to read RDB block 1 [ 524.772389][ T25] audit: type=1804 audit(1572483552.515:65): pid=9314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/67/bus" dev="sda1" ino=16769 res=1 [ 524.779713][ T9307] loop5: unable to read partition table [ 524.861206][ T9307] loop5: partition table beyond EOD, truncated [ 524.883432][ T9307] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 00:59:12 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 525.006333][ T25] audit: type=1804 audit(1572483552.775:66): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/67/bus" dev="sda1" ino=16769 res=1 [ 525.101796][ T25] audit: type=1804 audit(1572483552.805:67): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/67/bus" dev="sda1" ino=16769 res=1 00:59:12 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x2, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 00:59:12 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:12 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) [ 525.190842][ T25] audit: type=1804 audit(1572483552.815:68): pid=9314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/67/bus" dev="sda1" ino=16769 res=1 [ 525.223416][ T25] audit: type=1800 audit(1572483552.835:69): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16785 res=0 00:59:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}]) dup3(r0, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 00:59:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 00:59:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x800, 0x0, 0xff, 0xfa2265ac71d467d3}, 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes128, 0x0, [], "5b2625fa1756738b9014a5e2c2ec885f"}) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xd339}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x8) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) 00:59:19 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 00:59:19 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 00:59:19 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8b1b5d2f3ead6cf1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x800, 0x0, 0xff, 0xfa2265ac71d467d3}, 0x20) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes128, 0x0, [], "5b2625fa1756738b9014a5e2c2ec885f"}) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0xd339}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) 00:59:19 executing program 4: syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') epoll_create1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) open(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') creat(&(0x7f0000000000)='./bus\x00', 0x0) unshare(0x40400) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000000)={0x7fff}, &(0x7f0000000200), 0x0) 00:59:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg$inet(r0, &(0x7f0000002180)=[{{0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f00000001c0)="cf935006c7b76198dce58fce1425", 0xe}], 0x1}}, {{&(0x7f0000000240)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x2, 0x0) 00:59:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) 00:59:20 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 00:59:20 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[], 0x0, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 532.469851][ T25] audit: type=1804 audit(1572483560.235:70): pid=9382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 00:59:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x8000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c92465e5f9cc2d3fbf0322168078aba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcaa94a96d58db92af7f9298918ae95b745777a1968e48d46358c8735e3b009f9d01000000000000005b5895e126de3d6d7c6949c6a87cf3ab2fbe80d1028d6e727a596c761e274e8f7bf745addbe19bd7642d38323564278e0410a966da6a254b9c2fa9c5d27796310a", 0xd5}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x91, 0x0, 0xffffffffffffffef}, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) [ 532.548740][ T25] audit: type=1804 audit(1572483560.295:71): pid=9385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.583874][ T25] audit: type=1804 audit(1572483560.295:72): pid=9382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.702193][ T25] audit: type=1804 audit(1572483560.305:73): pid=9382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.755496][ T25] audit: type=1804 audit(1572483560.345:74): pid=9385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.812698][ T25] audit: type=1804 audit(1572483560.345:75): pid=9387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.846678][ T25] audit: type=1804 audit(1572483560.355:76): pid=9385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.875952][ T25] audit: type=1804 audit(1572483560.355:77): pid=9382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 [ 532.900847][ T25] audit: type=1804 audit(1572483560.365:78): pid=9385 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/80/bus" dev="sda1" ino=16894 res=1 00:59:28 executing program 0: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 00:59:28 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 00:59:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f000077ffe8)) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, 0x0, &(0x7f0000000000)=0x352) 00:59:28 executing program 2: r0 = semget(0x2, 0x0, 0x0) semctl$GETVAL(r0, 0xc6000000, 0x5, 0x0) 00:59:28 executing program 5: r0 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000080)={'~task ', 'u\x03\x00\x00\x00\xf68\x17\x8c\x8d\xc3\xeb::\n'}, 0x15) execveat(r0, 0x0, 0x0, 0x0, 0x1000) [ 540.616954][ T25] audit: type=1400 audit(1572483568.385:79): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=9404 comm="syz-executor.5" [ 540.640600][ T9414] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 00:59:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) fallocate(r0, 0x1, 0x0, 0x80000001) 00:59:28 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:59:28 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:28 executing program 5: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prlimit64(0x0, 0x2, &(0x7f0000000040), 0x0) select(0xf4, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xc}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:59:28 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) setresuid(0xee01, 0xffffffffffffffff, 0xee00) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000180)='\x00\xdb\x8e\xf4\x00\x00\x00') getdents64(r1, &(0x7f0000000000)=""/188, 0xbc) getdents64(r1, &(0x7f0000000df0)=""/528, 0x7f355eb8) r2 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x8000, 0x10) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f00000001c0)=""/5, &(0x7f00000002c0)=0x5) clone(0x54041bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x5, 0x1) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) sendfile(r3, r4, &(0x7f0000000440), 0x10001) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) getuid() setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000080)={0x3, 'bond0\x00', 0x2}, 0x18) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0xb51807a37eda15a2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r7, 0x0, 0xfffffda9, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x8000000000000003, @loopback}, 0x10) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x1, &(0x7f0000000380)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) recvmsg(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/192, 0xc0}], 0x153, 0x0, 0xdd}, 0x102) r8 = gettid() recvmmsg(r7, &(0x7f0000000ac0), 0x12f, 0x10100, 0x0) tkill(r8, 0x14) [ 541.050483][ T9426] mmap: syz-executor.5 (9426): VmData 18665472 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 00:59:28 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = inotify_init() dup2(r0, r1) [ 541.244919][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 541.250735][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 541.258137][ T9441] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.484894][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 541.490715][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 541.884924][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 541.890717][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 541.896561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 541.902294][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 541.964951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 541.970768][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:59:36 executing program 0: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 00:59:36 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:59:36 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:36 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 00:59:36 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 00:59:36 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x2000000000000010, 0x1000040000000003, 0x0) write(r1, &(0x7f0000000000)="2200000014006701040000000000000402080313010000000800020041670ee376ab", 0x22) 00:59:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 00:59:37 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 549.363938][ T9478] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 00:59:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) 00:59:37 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:37 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 00:59:37 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) 00:59:47 executing program 0: 00:59:47 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) ioctl$PPPIOCSDEBUG(r0, 0x40047440, 0x0) 00:59:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) 00:59:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) 00:59:47 executing program 2: 00:59:47 executing program 2: [ 559.890166][ T9526] bridge0: port 2(bridge_slave_1) entered disabled state 00:59:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) 00:59:47 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 559.979953][ T9528] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.987074][ T9528] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.028767][ T9528] device bridge0 entered promiscuous mode 00:59:47 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) 00:59:48 executing program 2: 00:59:48 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 560.218523][ T9528] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.239196][ T9528] device bridge0 left promiscuous mode [ 560.416346][ T9526] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.423487][ T9526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.461279][ T9526] device bridge0 entered promiscuous mode [ 560.985015][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:59:53 executing program 0: 00:59:53 executing program 2: 00:59:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) 00:59:53 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xb779ef21efb66f11}) 00:59:53 executing program 5: [ 566.152154][ T9560] bridge0: port 2(bridge_slave_1) entered disabled state 00:59:54 executing program 5: [ 566.227047][ T9560] device bridge0 left promiscuous mode 00:59:54 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0xfffffffb}]}) 00:59:54 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:54 executing program 2: 00:59:54 executing program 5: [ 566.518328][ T9562] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.525485][ T9562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.554139][ T9562] device bridge0 entered promiscuous mode 00:59:54 executing program 2: [ 567.564985][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:59:58 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x103e, 0x0) execve(0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x2841, 0x0) 00:59:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0xfffffffb}]}) 00:59:58 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:58 executing program 2: 00:59:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) 00:59:58 executing program 4: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)={r2}) read$eventfd(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) dup(0xffffffffffffffff) 00:59:58 executing program 5: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)={r2}) dup(0xffffffffffffffff) [ 570.420372][ T9587] devpts: called with bogus options [ 570.429375][ T9587] devpts: called with bogus options 00:59:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)) 00:59:58 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[], 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:59:58 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0xfffffffb}]}) 00:59:58 executing program 4: creat(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x10, 0x10000000003, 0x9) r1 = dup2(r0, r0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="24000000fa0307041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e280000005304ffffba16a0aa1c0009b356da5a80d18b6e06e9fd62662455a4df49d05343793cec4c", 0x2a4}], 0x1}, 0x0) 00:59:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) close(r0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000080)) [ 571.096736][ T25] audit: type=1107 audit(1572483598.865:80): pid=9627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VÚZ€Ñ‹néýbf$U¤ßIÐSCy<ìL' [ 571.140898][ T25] audit: type=1107 audit(1572483598.905:81): pid=9627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='VÚZ€Ñ‹néýbf$U¤ßIÐSCy<ìL' 01:00:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) 01:00:05 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:05 executing program 5: 01:00:05 executing program 2: 01:00:05 executing program 4: 01:00:05 executing program 0: 01:00:05 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:05 executing program 2: [ 577.955849][ T25] audit: type=1326 audit(1572483605.725:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9645 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 01:00:05 executing program 4: 01:00:05 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/364], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 01:00:06 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:06 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) 01:00:06 executing program 4: r0 = socket(0x800000018, 0x1, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 01:00:06 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:06 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:00:06 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe73, &(0x7f0000000080)={0x0, 0xffffffffffffffb8}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000100)="290000001800190000003fffffffda0602007a00fde8ff01084800040d0005000000000000000000ff", 0x29}], 0x1) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000180), 0x4924acf, 0x0) [ 578.810252][ T9683] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 578.861399][ T25] audit: type=1326 audit(1572483606.625:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9684 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 [ 578.924867][ C0] net_ratelimit: 6 callbacks suppressed [ 578.924897][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 578.936289][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:00:11 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:11 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:00:11 executing program 4: r0 = socket$inet(0x2, 0x3, 0x20) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x11c}) 01:00:11 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:11 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:11 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006}]}) [ 584.152775][ T25] audit: type=1326 audit(1572483611.915:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9694 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 01:00:12 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:00:12 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000180)={0x20, 0x2, 0x5, 0x7, 0xffffffff}) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c594512634c060cfb6b72c3c922835d2b5fe1600c22b487813885"], 0x35) close(r3) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0x0, 0x110001) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) getpid() getpid() finit_module(0xffffffffffffffff, &(0x7f0000000000)='security/(\x00', 0x6) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x8}) [ 584.284932][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 584.290873][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:00:12 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgsnd(r0, &(0x7f0000002440)=ANY=[@ANYBLOB="02"], 0x1, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:00:12 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff, 0x8, 0xffffffffffffff0d, &(0x7f0000000000), &(0x7f0000000040)="a46d226dd5d803c685b2f4975fbd0d1fdf1e64855a52bc1bf010e648fe9dfcf63d185dba15e3054eb3d3c02d82089a05036bb2acf3469fc0872546bab313270778cf2c96362bda1c6fca23e0f5c5ef8401"}, 0x40) 01:00:12 executing program 2 (fault-call:0 fault-nth:0): mlockall(0x8) 01:00:18 executing program 0: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000e80)={0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x310) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) fsetxattr$security_smack_entry(r1, &(0x7f0000000240)='security.SMACK64MMAP\x00', &(0x7f0000000480)='\xccvmnet0\xf7mime_typeppp0\x00', 0x16, 0x2) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000440)={'U+', 0x20}, 0x28, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffb000/0x3000)=nil) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000d00)='./file0\x00') lstat(0x0, &(0x7f0000000600)) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) ioctl$SG_GET_NUM_WAITING(r2, 0x2286, &(0x7f0000000040)) open(0x0, 0x0, 0x0) r3 = open(0x0, 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, 0x0) accept4$tipc(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x10, 0x800) geteuid() getegid() 01:00:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:00:18 executing program 2: mlockall(0x8) 01:00:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r28, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r28, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) sendfile(r0, r25, 0x0, 0x200fff) 01:00:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) clock_gettime(0x0, &(0x7f0000001900)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000001740)=[{&(0x7f0000000080)=""/4087, 0xff7}, {&(0x7f0000001080)=""/245, 0xf5}, {&(0x7f0000001180)=""/96, 0x60}, {&(0x7f0000001200)=""/201, 0xc9}, {&(0x7f0000001300)=""/136, 0x88}, {&(0x7f00000013c0)=""/243, 0xf3}, {&(0x7f00000014c0)=""/246, 0xf6}, {&(0x7f00000015c0)=""/224, 0xe0}, {&(0x7f00000016c0)=""/127, 0x7f}], 0x9, &(0x7f0000001800)=""/138, 0x8a}}], 0x1, 0x2002, &(0x7f0000001940)={r1, r2+30000000}) mlockall(0x8) 01:00:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r4 = gettid() tkill(r4, 0x32) 01:00:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r28, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r28, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) sendfile(r0, r25, 0x0, 0x200fff) 01:00:18 executing program 2: mlockall(0x8) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) accept4$rose(r1, &(0x7f0000000100)=@short={0xb, @remote, @bcast, 0x1, @bcast}, &(0x7f0000000140)=0x1c, 0x80400) 01:00:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) gettid() 01:00:18 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) migrate_pages(r0, 0x40, &(0x7f0000000000)=0x80, &(0x7f0000000040)) ioprio_get$pid(0x1, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000140)={r1, 0x0, 0x80, 0x50, 0x10000}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x1, 0x5, 0x6, 0x0, 0xf5, 0x11000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8001, 0x1}, 0x8, 0x12, 0x2, 0x9, 0x8e2f, 0x800, 0x5bb3}, r3, 0x3, r4, 0x9) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000180)={0x3d, 0xa499, 0x6, 0x8}, 0x8) mlockall(0x7) 01:00:18 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r28, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r28, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) sendfile(r0, r25, 0x0, 0x200fff) 01:00:18 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) 01:00:25 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000002c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000000)={0x0, 0x8000}) 01:00:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r28, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r28, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) sendfile(r0, r25, 0x0, 0x200fff) 01:00:25 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 01:00:25 executing program 3: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) migrate_pages(r0, 0x40, &(0x7f0000000000)=0x80, &(0x7f0000000040)) ioprio_get$pid(0x1, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000140)={r1, 0x0, 0x80, 0x50, 0x10000}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x1, 0x1, 0x5, 0x6, 0x0, 0xf5, 0x11000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x8001, 0x1}, 0x8, 0x12, 0x2, 0x9, 0x8e2f, 0x800, 0x5bb3}, r3, 0x3, r4, 0x9) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000180)={0x3d, 0xa499, 0x6, 0x8}, 0x8) mlockall(0x7) 01:00:25 executing program 2: mlockall(0x8) 01:00:25 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) gettid() [ 598.124886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 598.130716][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:00:26 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r1, 0x0, r2) 01:00:26 executing program 2: mlockall(0x4) 01:00:26 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) ioctl$void(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x800000000000055, 0x0, 0x0, [{r1}]}) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x200, 0x0) 01:00:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r26 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r28 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r28, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r28, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r27, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r26, 0x2405, r27) 01:00:26 executing program 2: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)=@v2={0x2, @aes256, 0x3, [], "f72f4ed5d05ab0c38277bce79ca95a5e"}) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'ip6erspan0\x00', 0x2}) mlockall(0x8) 01:00:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r26 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r27, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r27, 0x80087601, &(0x7f00000000c0)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r26, 0x0) 01:00:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4000000032, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x24a, 0x0) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', 0x0, 0x0, &(0x7f0000000c40)={'trans=unix,'}) open(0x0, 0x0, 0x0) 01:00:30 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) ioctl$void(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001200)="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", 0x1000}, {&(0x7f0000002280)="bc", 0x1}], 0x2}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x80, 0x800) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x800000000000055, 0x0, 0x0, [{r1}]}) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) 01:00:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r26 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r26, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_GETVERSION(r26, 0x80087601, &(0x7f00000000c0)) 01:00:30 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000002280)="bc", 0x1}], 0x2}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ba865b70ef0549655ee83385ec486e7d9f9df80c7eaecf0d0e01aa5dd0411f9439f60e7f60c03f9b352e2db61b3856fb0a65b5df402a390664250b102147a26c6f05500878f57725ac791c5dc16be8e9ee045e8168037e738c21800efa845d01d1bd0bff235a7b4675071dbeaa02a5ebf8bdc8f57015f1686666863640492ff69c94c239dc34baf404a6bcd09d73c16532040677596a3c5114da2bf581bf8ab229c38e599aea1d5cdb5aef87d3332246cbf46ab2c43b9af8d4b5d6f66390f9638dfc683e02e00dda6f867624b0c6237ba602b0d7690bbba3be4a7ea90df116058bfc8f89975668f8310270c2e7cfbc471f5486a7b5"], 0x1}}, 0x0) close(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000140)={0x0, 0x0, 0x800000000000055, 0x0, 0x0, [{r1}]}) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x200, 0x0) 01:00:30 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) 01:00:30 executing program 2: r0 = socket(0x4, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x2, 0x3e6, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]}, 0x45e) mlockall(0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100000, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x6, 0x22}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'syzkaller0\x00', 0x4000}) 01:00:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:30 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 01:00:30 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r26 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r26, &(0x7f00000017c0), 0x33d, 0x0) 01:00:30 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) ftruncate(r1, 0x2) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000180)="93265fa99fa232d5d3e830d0f35c44568af80057517415bd1842ec2add25af97a0e0d9a22c6727cc34cfbe2bd085a1c6bc2f012ba22d63c129f9093aa9e1b995fdcfa75149719203328cf590ae9449b02f4bd887da720f262f8ff9376e4a161f81273413557aa453f34722b0437002725089832b02cc287fa863c479ff6076784c637ba1d0667b83d0cee8c81bc8645bdc5f79fbe95bf274beec4c744aa499f0dfdb28ea3f3f908365fb3fea51fe0b081a10aca55ff89468288acdc230004bb7d8e4b2c0841ee5f0c3bcb20a88c02848c15c5e0a2da8efd1e8a15a71815a76f3af48800f5b69bac0b0310b4ace", 0xed, 0x9}, {&(0x7f0000000280)="bdf52b5316944429f6900f615caafb588d93c85e3ac58c4b04d9c91dbb4ba4749b93c57c8543044a25e4709ed82b2c46fedaaa3f1edaeab07b8c06c107af454cf3003bd33184d7d490054b6cc1bd9da33ba3d7edee", 0x55, 0x7}, {&(0x7f0000000300)="65a585aa4705f8cfd4708412af4a672f25e92610598ca2c3014378ee1f0053f2d52a0730fc7a3feb24b6b6124fc432a530db87e059d04c39251b1f74d86a9c0b412f7d096beffd7eacff6e1debe7fbc2754711f0adccf83bafae4a189a57c85082f0a81ea8b3ef5f6656df4ab72f31bdd65209115f4f9f01bf1984310a99fbbac36905022168c6e60264feafd2e0fa42780737a46a2b52d9bb3e60a499686c600dc51af1cf9adf760a9176c7a40a5ee45b73f3ac7980e67993daf41f38e6d06bb690a89ca7984a501379523a8e69", 0xce, 0x5}], 0x3000000, &(0x7f0000000480)=ANY=[@ANYBLOB="696fa15baf34ef78d75d63703836302c6d61703d61636f726e2c6e6f726f636b2c636865636b3d7374726963742c6f626a5f726f6c653d6e65742f756e697807007063723d30303030303030303030303030303030303031392c00"]) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @pic={0x0, 0x0, 0x3, 0x2, 0x8, 0x4, 0x2, 0xff, 0xf8, 0x0, 0x5, 0x7, 0xfe, 0x2, 0x7f, 0x3}}) r2 = syz_open_dev$admmidi(&(0x7f0000000500)='/dev/admmidi#\x00', 0x3, 0x80000) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000540)={0x8000000000000000, 0x3000, 0x5, 0x16, 0x1d}) 01:00:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000a80)=ANY=[]) 01:00:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') 01:00:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioprio_set$pid(0x0, 0x0, 0x1) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') timer_settime(0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_ONE_REG(0xffffffffffffffff, 0x4010aeab, 0x0) 01:00:31 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:31 executing program 2: mlockall(0x3) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='veth1_to_team\x00') 01:00:31 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000002100)=[{{&(0x7f00000001c0)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "6c48a3", 0x30, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "ae00", 0x0, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @rand_addr="a48f3c894df47445b57ca596aec6bb4f"}}}}}}}, 0x0) 01:00:31 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:00:31 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) [ 604.865633][ T8336] device bridge_slave_1 left promiscuous mode [ 604.871886][ T8336] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.930018][ T8336] device bridge_slave_0 left promiscuous mode [ 604.970027][ T8336] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.795194][ T8336] device hsr_slave_0 left promiscuous mode [ 605.835024][ T8336] device hsr_slave_1 left promiscuous mode [ 605.899405][ T8336] team0 (unregistering): Port device team_slave_1 removed [ 605.911720][ T8336] team0 (unregistering): Port device team_slave_0 removed [ 605.928727][ T8336] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 605.988531][ T8336] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 606.050695][ T8336] bond0 (unregistering): Released all slaves [ 606.212644][ T9914] IPVS: ftp: loaded support on port[0] = 21 [ 606.273794][ T9914] chnl_net:caif_netlink_parms(): no params data found [ 606.304914][ T9914] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.312086][ T9914] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.320022][ T9914] device bridge_slave_0 entered promiscuous mode [ 606.327900][ T9914] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.335043][ T9914] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.342855][ T9914] device bridge_slave_1 entered promiscuous mode [ 606.421834][ T9914] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 606.433126][ T9914] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 606.462162][ T9914] team0: Port device team_slave_0 added [ 606.473706][ T9914] team0: Port device team_slave_1 added [ 606.538254][ T9914] device hsr_slave_0 entered promiscuous mode [ 606.585334][ T9914] device hsr_slave_1 entered promiscuous mode [ 606.640003][ T9914] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.647126][ T9914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.654474][ T9914] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.661621][ T9914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.720247][ T9914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 606.735172][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 606.749017][ T7509] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.758229][ T7509] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.778849][ T9914] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.794044][ T7509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.803300][ T7509] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.810379][ T7509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.840035][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.849274][ T7366] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.856416][ T7366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.866861][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 606.885707][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 606.894639][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 606.904707][ T7366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.918261][ T9914] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 606.930712][ T9914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 606.940356][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.965878][ T9914] 8021q: adding VLAN 0 to HW filter on device batadv0 01:00:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:00:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') add_key(0x0, 0x0, &(0x7f00000003c0)="b7e7de8fd7ac9e87e6ca7c4a51dca031a38cc1285e0b8557e5a9e4b3ade3e480cc5051b7aa35d7984ed60569de093e61362a8fcb8d44dedda978f84b78b94c324b75f14aeea66a919fc01e6982258961177ade230307fa8843873e9473599e70a5dd10749e16cd87e20c4bccaf58c967a590ce7b394618959e0e1612b72c861c83e5eab3f85329b2dbd3ebe9bc531f43", 0x90, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) 01:00:35 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:35 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080003000d000000", 0x24) 01:00:35 executing program 2: prctl$PR_GET_CHILD_SUBREAPER(0x25) mlockall(0x3) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x60000, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 01:00:35 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:35 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240), 0x4) 01:00:35 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 01:00:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x48, 0x2c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 01:00:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5e5bc53ab81262c0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3e1ef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc92051a5b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7927d6b2bcdceb6b7fb4fccbc00"/236], 0x8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, 0xe8) 01:00:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) syz_open_dev$media(0x0, 0x0, 0x0) 01:00:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x48, 0x2c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 01:00:36 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5e5bc53ab81262c0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3e1ef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc92051a5b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7927d6b2bcdceb6b7fb4fccbc00"/236], 0x8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) 01:00:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x2, 0x40, 0x7, 0x2, 0x0, 0x9, 0x19, 0x40, 0x1a, 0xa03, 0x1d, 0x38, 0x2, 0x0, 0x6, 0x9}, [{0x3, 0xff, 0x401, 0xd549, 0x800, 0x3, 0x4, 0x8}, {0x6, 0x2, 0x3ff, 0x294, 0x0, 0x7, 0x8, 0x400}], "b10efc7cc495692c9a8c409764192482f74f2a0fda817a598d364b799647ef1c5fe2c571c123d8aa6adbf7faa3a3651aa07cd549f4b87cf2c4b2a87151196018f61f0ba5ab9776de71a5d9b3f8619ebdbac562de42ec04af9c78fe0553cb28512db4fa66efdec99f5f8b9fe9aadea7aa3e505a8208cd19aeb21043b654f8978a36ac67", [[], [], [], [], []]}, 0x633) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) fcntl$getown(r0, 0x9) mlockall(0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dsp\x00', 0x20000, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000006c0)={0x1ff, 0x47c3ba62f13bc9de, 0x2000}, 0x4) 01:00:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@ipv6_newroute={0x30, 0x18, 0x311, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xfe}, [@RTA_GATEWAY={0x14, 0x5, @loopback={0x0, 0x8}}]}, 0x30}}, 0x0) 01:00:36 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:36 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r25 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r25, 0x2008002) [ 609.034102][ T9994] IPv6: NLM_F_REPLACE set, but no existing node found! 01:00:36 executing program 2: mlockall(0x8b54ce1e3da97132) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20c00, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000000c0)={0x5, &(0x7f0000000000)=[{0x7f, 0xff, 0xfe, 0xc39}, {0x8, 0x4, 0x8, 0xfffff524}, {0xd1, 0x1, 0x20, 0x6}, {0x100, 0x5, 0x80, 0x101}, {0x80, 0x3, 0xff, 0x2}]}) write$P9_RLINK(r0, &(0x7f0000000080)={0x11e, 0x47, 0x1}, 0xfffffffffffffcd6) 01:00:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001ffc382ebd5e5bc53ab81262c0e6657c9145d1296714af248d32825ef82b6734e5a38b13b2a46b2896069e668e8af31c3e8132551000381668850a81eeb9a2f641de9e0242cef3fe27cf3d66e7e95c0ad3e1ef88e12f7a1d12d335f13fb31f86c7f35eba437b058cc620229d7839683afcd80a204fc04a0242b49ff12289013cbf84707dc92051a5b19b1c7aa64501f2ec145d5db86598e85d7ee97c8cc1a2d7bc47c3bb8c96e466d3ba2aedf6639bc5228b0e1b3140c6c0f8cd6dceece8dc3ff9c7927d6b2bcdceb6b7fb4fccbc00"/236], 0x8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) 01:00:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x4) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x102) 01:00:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:37 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0xa042) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) 01:00:37 executing program 2: mlockall(0x8) r0 = semget$private(0x0, 0x20000000102, 0x0) semctl$SETALL(r0, 0x0, 0x2, &(0x7f0000000400)) semctl$IPC_INFO(r0, 0x2, 0x3, &(0x7f0000000000)=""/253) 01:00:37 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe05"], 0xb}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 01:00:37 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x7, 0x4) 01:00:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:37 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) r24 = socket(0x11, 0x800000003, 0x81) bind(r24, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) [ 610.127631][T10023] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 610.159594][T10023] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 610.229439][T10023] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 610.259710][T10023] EXT4-fs error (device loop1): ext4_fill_super:4489: inode #2: comm syz-executor.1: iget: root inode unallocated 01:00:38 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200000, 0x0) 01:00:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev, 0x7}, 0x1c) setsockopt(r0, 0x8000000000000001, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0xffa7) ioctl$sock_ifreq(r5, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) sched_setattr(0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r7}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) [ 610.316576][T10023] EXT4-fs (loop1): get root inode failed [ 610.350808][T10023] EXT4-fs (loop1): mount failed 01:00:38 executing program 5: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) socket(0x11, 0x800000003, 0x81) 01:00:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:38 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 01:00:38 executing program 2: mlockall(0x8) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) 01:00:38 executing program 5: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:38 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) close(r0) 01:00:39 executing program 5: syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) r7 = geteuid() r8 = geteuid() r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r12 = getgid() r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) fstat(r13, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r16 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r16}, 0x0) r17 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r17, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r18) r19 = gettid() r20 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r21) sendmsg$unix(r15, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r16, 0x0, r18}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000700)=0x0, &(0x7f0000000740), &(0x7f0000000780)) fsetxattr$system_posix_acl(r1, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000c00)=ANY=[@ANYBLOB="02000000010004000000000002000b00", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="0200051648008702b53403edb63400006319a80c850a27daf0ad6e1503c851aa5db32607cd8cf6d8ce2c90743f8801022f74f41c84e0794d65ddbe851658e87b538244de44636aebff9a0fe5f07f59ea0af174422ad0d8af471559a381431f2c62f89f5e8f806e52bfecc17cff803de555a0c6b8eea68cb63cf934765723684b4b0000ccb93eea6625fca9c7ba1b76e2d6ba1cd32fe8972c8c1c017e28b4a7db3cb404a2099050fd5d27e99be835bcf7d4ee351ec7963f2e7bad07c5790cc8a0ee6d248a9a97edcceb4fb0e059d08c1644ce359280c8ddcf2b3514cb7093341cc4d00ebbc07c8c6d87", @ANYRES32, @ANYBLOB="020094b9", @ANYRES32=r7, @ANYBLOB="02000100", @ANYRES32=r8, @ANYBLOB="02000a00", @ANYRES32=r10, @ANYBLOB="2a0000000000000008000400", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000300", @ANYRES32=r14, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r18, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r22, @ANYBLOB='\b\x00\v\x00', @ANYRES32=r23, @ANYBLOB="10000600000000002000010000000000"], 0x94, 0x1) 01:00:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:39 executing program 2: mlockall(0x9) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x80) accept4$bt_l2cap(r0, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x1c00) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @loopback}}, 0x0, 0x3, 0x0, "fbbd0bc7edf2213e914b7fc8fb98186e2e16517e99606c7ef264c4153500793aa46cbc2fe0050df66c77aab97d2fb057ff3aa2fc87ce32a7a533ecec41e76579fbac3951667dd0eb534529db411051d7"}, 0xd8) 01:00:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev, 0x7}, 0x1c) setsockopt(r0, 0x8000000000000001, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0xffa7) ioctl$sock_ifreq(r5, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) sched_setattr(0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r7}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 01:00:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) r6 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r7 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r7}, 0x0) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r9) r10 = gettid() r11 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r12) sendmsg$unix(r6, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) 01:00:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 01:00:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:39 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 01:00:39 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) r6 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r7 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r7}, 0x0) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r9) r10 = gettid() r11 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r12) sendmsg$unix(r6, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)) 01:00:39 executing program 2: mlockall(0x8) r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\x00', r1}, 0x10) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000100)=""/123, 0x7b}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/111, 0x6f}, {&(0x7f00000002c0)=""/62, 0x3e}], 0x4) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000000)) 01:00:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 01:00:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) 01:00:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) r6 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r7 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r7}, 0x0) r8 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r8, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r9) r10 = gettid() r11 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r12) sendmsg$unix(r6, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r7, 0x0, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, 0xee01}}}], 0x40}, 0x0) 01:00:40 executing program 2: ioperm(0x1, 0x100, 0x9356) r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x9a6, 0x1e3001) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) mlockall(0x1) arch_prctl$ARCH_GET_CPUID(0x1011) 01:00:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev, 0x7}, 0x1c) setsockopt(r0, 0x8000000000000001, 0x10000000000009, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0xffa7) ioctl$sock_ifreq(r5, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) sched_setattr(0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f0000000180)={@remote, 0x27}) getpeername$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000440)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, r7}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 01:00:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:40 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) gettid() r9 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r10) 01:00:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) gettid() socket(0x1, 0x0, 0x0) setreuid(0x0, 0x0) 01:00:41 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') syz_open_procfs(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 01:00:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a8018d82eb9962d1e1cd2035779d44c8c51df7494a4d1eac2a8e7482fae1129ad73f4b9a58d58b837590c6ab3b073f9a7ca2d8ac71ccff6ce5eb1ab6e9339290", "402790e4d1b87e04e8bf73acc5fc4beb45ec74ffc09efda3e2ede029a01ce6a8d4c09dff1545b9f8274302b2db27d6981e15270eae07839ad1e58655a4d69056", "d0c3ede2bc1e8d39b09e7b16e3aac59f7cd883598d8a68542d7924a0b306ec81"}) 01:00:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) gettid() setreuid(0x0, 0x0) 01:00:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x10}]}}}]}, 0x3c}}, 0x0) 01:00:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xe000, 0xce3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x67) r0 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x40004) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf00}}) 01:00:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r8) setreuid(0x0, 0x0) [ 613.940467][T10177] netlink: 'syz-executor.5': attribute type 16 has an invalid length. 01:00:42 executing program 2: mlockall(0x8) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x401, 0x0) 01:00:42 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) 01:00:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xe000, 0xce3e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x67) r0 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x40004) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0xa, 0x0, 0xf00}}) 01:00:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r7, &(0x7f0000000380)) setreuid(0x0, 0x0) 01:00:42 executing program 2: mlockall(0x7) 01:00:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x4) accept(r0, 0x0, 0x0) shutdown(r0, 0x0) 01:00:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000700201000000003900090035004002060000001900154002000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:00:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setreuid(0x0, 0x0) [ 614.892559][T10208] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.5'. [ 614.960938][T10208] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.5'. 01:00:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:42 executing program 3: 01:00:42 executing program 2: mlockall(0xeb0a47548b7303eb) 01:00:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a280930206030000700201000000003900090035004002060000001900154002000000000022dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:00:42 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r6 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r6}, 0x0) setreuid(0x0, 0x0) [ 615.341327][T10222] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.5'. 01:00:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() setreuid(0x0, 0x0) 01:00:43 executing program 3: 01:00:43 executing program 5: 01:00:43 executing program 3: 01:00:43 executing program 1: 01:00:43 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) setreuid(0x0, 0x0) 01:00:43 executing program 5: 01:00:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:44 executing program 3: 01:00:44 executing program 2: mlockall(0x8) r0 = shmget(0x1, 0x1000, 0x8, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r0, 0x2) shmctl$SHM_UNLOCK(r0, 0xc) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x88080, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40140, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000080)=0x8) shmctl$SHM_LOCK(r1, 0x2) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0xb000) io_setup(0x0, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x8, 0x40000) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r6, &(0x7f0000002d80), 0xa, 0x0) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x1096, 0x40000) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f0000004340)=[{&(0x7f0000002e40)=""/148, 0x94}, {&(0x7f0000002f00)=""/165, 0xa5}, {&(0x7f0000002fc0)=""/235, 0xeb}, {&(0x7f00000030c0)=""/159, 0x9f}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/196, 0xc4}, {&(0x7f0000004280)=""/31, 0x1f}, {&(0x7f00000042c0)=""/43, 0x2b}, {&(0x7f0000004300)}], 0x9, 0x0) r8 = open(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) ioctl$RTC_PIE_ON(r8, 0x7005) socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) 01:00:44 executing program 1: 01:00:44 executing program 5: 01:00:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) fstat(r5, &(0x7f00000005c0)) setreuid(0x0, 0x0) 01:00:44 executing program 1: 01:00:44 executing program 5: 01:00:44 executing program 3: 01:00:44 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) setreuid(0x0, 0x0) 01:00:44 executing program 5: 01:00:44 executing program 1: 01:00:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:45 executing program 3: 01:00:45 executing program 1: 01:00:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') setreuid(0x0, 0x0) 01:00:45 executing program 5: 01:00:45 executing program 2: mlockall(0x8) r0 = socket$netlink(0x10, 0x3, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000480)={0x50, r2, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x202004}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xcc, r2, 0x101, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x200}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf612}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fff}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1b}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x18}}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x4}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x20020000) 01:00:45 executing program 5: 01:00:45 executing program 3: [ 617.589734][T10291] IPVS: Error connecting to the multicast addr 01:00:45 executing program 1: [ 617.641705][T10295] IPVS: Error connecting to the multicast addr 01:00:45 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getgid() setreuid(0x0, 0x0) 01:00:45 executing program 3: 01:00:45 executing program 5: 01:00:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:46 executing program 1: 01:00:46 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r2, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r2, @ANYBLOB="5700000081a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235839ac208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"], &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x8001, 0x140aa78d6482c322, 0x9, 0x80000000, r2}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000080)={r3, @in6={{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x27}, 0x3}}, 0x49a4, 0xb02}, &(0x7f0000000140)=0x90) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000480)={0x0, 0x3}) preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r6, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r7, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x2, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r7, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r7, 0xfffffeff, 0x1}, &(0x7f0000000380)=0xc) r8 = accept4(r4, &(0x7f0000000180)=@can, &(0x7f0000000200)=0x80, 0x800) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x872b}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x1a, &(0x7f00000002c0)={r9}, &(0x7f0000000300)=0x8) 01:00:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setreuid(0x0, 0x0) 01:00:46 executing program 3: 01:00:46 executing program 5: 01:00:46 executing program 1: 01:00:46 executing program 5: 01:00:46 executing program 3: 01:00:46 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fff, 0x50800) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) mlockall(0x8) 01:00:46 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000980)={{{@in=@empty, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0x2f6) setreuid(0x0, 0x0) 01:00:46 executing program 1: 01:00:47 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:47 executing program 5: 01:00:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)={0x14, 0x42, 0x105}, 0x14}}, 0x0) 01:00:47 executing program 2: mlockall(0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setregs(0xd, r1, 0xa4d5, &(0x7f0000000080)="a392d21887b699c88f7dc33180a6bf32ed3f316047200f07bfaf2424917208a36c9fc9d9a7ac0526f2a32f88af706b560d093b41a1383cc53ba267c528d5b54fa8307a2d688dcb2eb7048fefd1d7d8a4f0b03d3eba") 01:00:47 executing program 1: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 01:00:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) setreuid(0x0, 0x0) 01:00:47 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x1, 0x0, @pic={0x2, 0xe9, 0x1, 0x8, 0x0, 0x7, 0x0, 0x1f, 0x1, 0x7, 0x2, 0x10, 0x1f, 0x9, 0x7f, 0x9}}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x0, 0x3f}, {0x4, 0x8}, 0xfffffffa, 0x5, 0x1f}) 01:00:47 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x101, 0x42a601) syz_open_procfs(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) inotify_init() unlink(&(0x7f0000000040)='./file0\x00') write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) creat(&(0x7f0000000180)='./file0\x00', 0x20) shutdown(0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) mq_getsetattr(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) 01:00:47 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') setreuid(0x0, 0x0) 01:00:47 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="5500000018007f5f00fe01b2a4a290930206040200000001080040003900090035004c0a0100000019000b4023dc0b04000022dc1338d54400009b84136ef75afb83de4411000500c43ab8220000060c3a62645656", 0x55}], 0x1}, 0x0) 01:00:47 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r3, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r3, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r3, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r4, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e21, @broadcast}]}, &(0x7f00000001c0)=0x10) mlockall(0x1) [ 619.935066][ T25] audit: type=1800 audit(1572483647.695:85): pid=10377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17045 res=0 01:00:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000400)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) open$dir(0x0, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RNDADDENTROPY(r2, 0x40085203, 0x0) [ 620.055438][ T25] audit: type=1804 audit(1572483647.735:86): pid=10372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir923491002/syzkaller.8oSkh7/69/file0/file0" dev="sda1" ino=17045 res=1 01:00:48 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x77359400}, 0x10) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="2265162d6c36d2d553b535288f726cee2343cd3da80438bbe33926e61647fc7fcab63c030ef325ad0f899dcc3d1baefa9b3b5a978b1e8319bcc3c41f139590cb2be0b46092dbd2174e400b05", 0x4c}], 0x1, 0x0) 01:00:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() geteuid() setreuid(0x0, 0x0) 01:00:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0xb8}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0x30c, &(0x7f0000000200)=""/251}, 0x7e) 01:00:48 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x101, 0x42a601) syz_open_procfs(0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) inotify_init() unlink(&(0x7f0000000040)='./file0\x00') write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r3, 0x0, 0x7fffffa7) creat(&(0x7f0000000180)='./file0\x00', 0x20) shutdown(0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) mq_getsetattr(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) 01:00:48 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) geteuid() setreuid(0x0, 0x0) 01:00:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0xa) [ 621.066653][ T25] audit: type=1800 audit(1572483648.835:87): pid=10417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17054 res=0 [ 621.144315][ T25] audit: type=1804 audit(1572483648.885:88): pid=10417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir923491002/syzkaller.8oSkh7/70/file0/file0" dev="sda1" ino=17054 res=1 01:00:49 executing program 3: syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0xc, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 01:00:49 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000880)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\x12\x9d\xae\x8f\xa9?/&\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x8a\xca/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xd0>\xd6#\xe1^\xa5\xfb\xff\x03\xf8\x00\x00\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\t\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b%\xb8|\x9e1\x9b\xdb\xaf8\xc0\f\xd3\xe2}bLr,\xda\xa0!\x03\xe9\xdb@\x92\xe0D\x8f=\xd9\xc0\x00\xfd+\xac-I\xa5\x04o\xa7\x1e\xbc#$d\xfc\x04\xec\xeb\x9f\xe0\xc2S3:\xfe\x9eOFd\x99\xa03(9\x1d\x87\x97?~\x1a9\xe0\x90z\x8e\x8f~\x96\x18Q\xa6\xb3\xfd\x953~L\xfa2\xbc\xc1\xe5\x12F`\xa6\xa1\x8e\x8e\r\x9e\xb5L\b+\"\xd1\xd0\x8eb\xd9\x1c\x87+\x83=X[\x95@?\'\xf2\xde0\xf9\xf9\xc3\x98Ev=\xb5\xa6\xc5\x87\xd8%\xd6\xf0\x98\xe6*\xe1K\xc4e', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000d80)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\xe5\xfdl >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_\x92\x89.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xcb\xfe\x1ftO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy\xb8\x1cK;\xc8\x95w\xa2\xfdO\xf2\xab\x19\xd2<\f\xdeO\x1d`C\xc9\x97\x8f}\xa1\x05+\xca\xc1/\x0fl\xc0\xe9]\x03<\xb6\x00_\xff\xe0\x1f\x87|G\"\x8e\xe6\x1a\xe2\xd3\x1b\x059\"\x18\t\xeb\xaeL\x0e3\x1a\xe2Rz\xc2\xd0\xdc\xach\xceV\b\xc4h\xb2;\xa9\xc4\x14?fi\xf8\"|0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6, @in6=@local}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) setreuid(0x0, 0x0) 01:00:49 executing program 2: mlockall(0x8) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)=0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x9, 0x6, 0x9}, 0xc) 01:00:49 executing program 3: syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$dmmidi(0x0, 0xc, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x33, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 01:00:49 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:49 executing program 1: syz_mount_image$reiserfs(&(0x7f00000008c0)='reiserfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)={[{@balloc_hashed_reloc='block-allocator=hashed_relocation'}]}) 01:00:49 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) fchdir(r2) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f00000003c0)='./file0\x00', 0xdfffeffffffffffa) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0x0, r4}) 01:00:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r3) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) fstat(r0, &(0x7f0000000200)) setreuid(0x0, 0x0) 01:00:49 executing program 2: mlockall(0x8) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r1, &(0x7f0000000d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000dc0)=0x80) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x2c8, &(0x7f0000000100)={&(0x7f00000001c0)={0x24, 0x23, 0x847, 0x0, 0x0, {0x2804}, [@typed={0x5, 0xb, @str='\x02\xac\x0f\x00me_type\x00'}]}, 0x269}}, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}]}, 0x1c}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x40, r2, 0x370ef6f8a490b954, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21575c7f}]}, 0x40}, 0x1, 0x0, 0x0, 0x448d0}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x20, 0xf2, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x40805) 01:00:49 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000080)) [ 622.281054][T10454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 622.396161][T10470] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 622.405619][T10461] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:00:50 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffd9db440000030000005b7213f60100ffffffff6b6f000000bb05a1196b08de163dd7bf0a05767dff2f9374f000000000000000000000000000004391a41888e0a6a9955d1bfa4976b19023533926d052bc7451ff"], 0x55) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 01:00:50 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r2) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r2}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000180)) setreuid(0x0, 0x0) [ 622.522821][T10461] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "" 01:00:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) creat(0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:00:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x81, 0x200801) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 01:00:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x4800) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r4, &(0x7f0000000340)) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x20010, r5, 0x3fd45000) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r6, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r7, 0x4040ae72, &(0x7f0000000180)={0x7, 0x20, 0x7f, 0x0, 0x6}) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000000)=0x9) r8 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r8, 0xc0406619, &(0x7f0000000080)={{0x1, 0x0, @reserved="04457c456eead89a35e453aded3e99e6591aea02be3f21f823ddf44afa28028e"}}) mlockall(0x8) 01:00:50 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r2) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0, 0x0, 0x5}, {0x0, 0x0, 0x7}, {0x0}, {&(0x7f0000000440)="4fc356603c12e98a75f62855748cf90b9aa65fb932238208d78b1e984813db8f4d6ccf9e8531d8fea29477ed78450d2e71166447bfd85516d86e5403ccef5143d4a696325caa5b2b7c72b687d937e5537b087cc9034e79271ed10927fb70e4a39053011ef9e6549de3dcf5e10d3d943380d6e4f007e43be0e8545f011fdb7827ad7b5a70d41b4c731c9f3b38f585f00a56d50571bc3f6f", 0x97}, {&(0x7f0000000600)}, {&(0x7f00000006c0)="78c94f35055e36b6f1e87f9c0c1937", 0xf, 0xc64f}], 0x4, &(0x7f0000000b00)={[{@umask={'umask'}}, {@discard='discard'}, {@discard_size={'discard', 0x3d, 0x100000001}}], [{@fowner_lt={'fowner<'}}, {@euid_lt={'euid<', r2}}, {@smackfstransmute={'smackfstransmute'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ppp0trusted'}}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '|'}}]}) setreuid(0x0, 0x0) 01:00:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:51 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffd9db440000030000005b7213f60100ffffffff6b6f000000bb05a1196b08de163dd7bf0a05767dff2f9374f000000000000000000000000000004391a41888e0a6a9955d1bfa4976b19023533926d052bc7451ff"], 0x55) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 01:00:51 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x81, 0x200801) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffd9db440000030000005b7213f60100ffffffff6b6f000000bb05a1196b08de163dd7bf0a05767dff2f9374f000000000000000000000000000004391a41888e0a6a9955d1bfa4976b19023533926d052bc7451fff39499f5ee36a34923a44864cea1523dfc625ec201630365657639e315625a6687d2726a26699e2b0048fc97c97fa999e069203443418236b4532362bf1571413e0df8a91506b344020bb6f8b942a1906df3b41cdba74803bd8e9f3f94ff413d24ba"], 0xb7) sendfile(r2, r2, &(0x7f0000000240), 0x0) 01:00:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:51 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r2) setreuid(0x0, 0x0) 01:00:51 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x80000) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) mlockall(0x4) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000200)='mime_typevmnet1em1cgroupeth1wlan1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, &(0x7f00000000c0)=0xf18001, 0xeefffdef) accept4$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14, 0x800) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) sendfile(r6, 0xffffffffffffffff, 0x0, 0xeefffdef) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x7c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x5c, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x50, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x9}, @tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x2}, @IFLA_IPTUN_ENCAP_SPORT={0x8, 0x11, 0x4e20}, @IFLA_IPTUN_TOS={0x8}, @IFLA_IPTUN_ENCAP_DPORT={0x8, 0x12, 0x4e22}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FWMARK={0x8}, @IFLA_IPTUN_LINK={0x8, 0x2, r5}, @IFLA_IPTUN_ENCAP_TYPE={0x8}], @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x39}]}}}]}, 0x7c}}, 0x0) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000040)={r5, 0x401, 0x3f, 0x81, 0xfc, 0x7, 0x7}) 01:00:51 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setreuid(0x0, 0x0) 01:00:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 01:00:51 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setreuid(0x0, 0x0) 01:00:51 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaac01, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x1019b, 0x400}], 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 01:00:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) [ 624.386332][T10546] EXT4-fs (loop3): unsupported inode size: 0 01:00:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 01:00:52 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setreuid(0x0, 0x0) 01:00:52 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") 01:00:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:52 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [{}]}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:00:52 executing program 2: mlockall(0x8) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x6, 0x642106) 01:00:52 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:00:52 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) socket(0xa, 0x80001, 0x0) setuid(0x0) setreuid(0x0, 0x0) 01:00:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 01:00:52 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:52 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x48) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x59, @mcast1, 0x7}, @in6={0xa, 0x4e22, 0xbb8, @rand_addr="66b67aa76a8e644b54d01c590a1f9298", 0x1f}, @in6={0xa, 0x4e22, 0x2, @loopback, 0x3f}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x401, @local, 0x1}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x2, @ipv4={[], [], @multicast2}}, @in6={0xa, 0x4e23, 0x5, @mcast2, 0x1000}], 0xd8) 01:00:53 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) socket(0xa, 0x80001, 0x0) setuid(0x0) setreuid(0x0, 0x0) 01:00:53 executing program 3: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4, 0x5}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:00:53 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:53 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:53 executing program 2: mlockall(0x2) 01:00:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r0) 01:00:53 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x81, 0x200801) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffd9db440000030000005b7213f60100ffffffff6b6f000000bb05a1196b08de163dd7bf0a05767dff2f9374f000000000000000000000000000004391a41888e0a6a9955d1bfa4976b19023533926d052bc7451fff39499f5ee36a34923a44864cea1523dfc625ec201630365657639e315625a6687d2726a26699e2b0048fc97c97fa999e069203443418236b4532362bf1571413e0df8a91506b344020bb6f8b942a1906df3b41cdba74803bd8e9f3f94ff413d24ba430550f1d8a7fd3db1a8540195b6fb60fc1089dfb7bd7d60eeee2e9fb3c498e07773c9b1a1b32ca0842c"], 0xe1) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 01:00:53 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:53 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast1}, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) 01:00:53 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) socket(0xa, 0x80001, 0x0) setuid(0x0) setreuid(0x0, 0x0) 01:00:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() sched_setattr(r2, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) socket(0x10, 0x2, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) 01:00:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') syncfs(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000480)=""/112, 0x6a}], 0x100000000000005f, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='scalable\x00', 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000380)={0x3, 0x0, 0x0, 0x1, {0x8, 0x0, 0x7, 0x9b}}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000300), &(0x7f0000000340)=0x30) mlockall(0x8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x140, 0x0) ioctl$CAPI_CLR_FLAGS(0xffffffffffffffff, 0x80044325, &(0x7f00000002c0)) setsockopt$inet_buf(r3, 0x0, 0x28, &(0x7f0000000140)="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", 0xfffffffffffffcd4) 01:00:54 executing program 3: 01:00:54 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:54 executing program 3: 01:00:54 executing program 5: 01:00:54 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:54 executing program 2: mlockall(0x68c9e2cdd857dee5) 01:00:54 executing program 3: 01:00:55 executing program 5: 01:00:55 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:55 executing program 2: mlockall(0x4) 01:00:55 executing program 3: 01:00:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:55 executing program 5: 01:00:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:55 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:55 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f00000000c0)={{0x1, 0x0, @reserved="577269da87a674b15d6e2a959459389fbccf2aa3d25e51cf4328d0322a18be0b"}}) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000000)=@srh={0x21, 0x10, 0x4, 0x8, 0x1, 0x20, 0x2, [@loopback, @empty, @rand_addr="dd606c4d7bd4ceab11d22500f8626a5b", @empty, @local, @dev={0xfe, 0x80, [], 0x11}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, 0x88) mlockall(0x8) 01:00:55 executing program 3: 01:00:55 executing program 5: 01:00:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:56 executing program 3: 01:00:56 executing program 4: socket$inet6(0xa, 0x400000000001, 0x0) r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:56 executing program 2: mlockall(0x8) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f00000000c0)={0xff, @broadcast, 0x4e21, 0x3, 'nq\x00', 0x28, 0xfc, 0x7b}, 0x2c) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000000)={0x9, 0xc, 0x2a, "d0a32306348c5a21e58ca39a108c5b399b234b80c17109f6d563d7a7c61e1e138d4b83c6c9a99f42e4205124a9de74053635e81a37eaa9f3568c7294", 0x1a, "dfc995c61a6661e1497042bba6db80465f20f6317edeb29a431eff02474dd1ebd690c12d487e2cec2b36802758330b7d7254afe183be5805e8df1b60", 0xd831dbb93988dbe5}) 01:00:56 executing program 5: [ 628.466258][T10708] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20001 [ 628.491662][T10709] IPVS: set_ctl: invalid protocol: 255 255.255.255.255:20001 01:00:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:56 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:56 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x1) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000040)={0x0, 0x0, @ioapic}) mlockall(0x8) 01:00:56 executing program 3: 01:00:56 executing program 5: 01:00:56 executing program 4: r0 = socket(0x0, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:56 executing program 5: 01:00:56 executing program 3: 01:00:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100)=0xfffffff9, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000001c0)=0x10) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000200)={0x3, 0x8, [{0x3, 0x0, 0x7}, {0x20, 0x0, 0x1f}, {0x8, 0x0, 0x7fff}]}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x1) mlockall(0x8) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') setsockopt$RDS_CANCEL_SENT_TO(r4, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e24, @broadcast}, 0x10) [ 629.405961][T10738] Unknown ioctl 1074296579 [ 629.472345][T10745] Unknown ioctl 1074296579 01:00:57 executing program 3: 01:00:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:57 executing program 5: 01:00:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:57 executing program 4: r0 = socket(0x0, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:57 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xfffffffffffff000, 0x800) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(0xffffffffffffffff, 0xc08c5336, &(0x7f0000000280)={0x2379, 0x78, 0x8, 'queue1\x00', 0xffffe193}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fsopen(&(0x7f00000003c0)='nfsd\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x6, 0x0, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfffffffffffffffa, 0x400) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f0000000080)) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x1000000000000169, 0x0) ioctl$VHOST_RESET_OWNER(r4, 0xaf02, 0x0) close(r2) mlockall(0x8) 01:00:57 executing program 3: 01:00:57 executing program 5: 01:00:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:57 executing program 3: 01:00:58 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002940)='/dev/dlm_plock\x00', 0x400, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r2, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r2, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000002980)={r2, @in={{0x2, 0x4e24, @multicast2}}, 0x2bd2604c, 0x3, 0x400, 0x7, 0x62}, &(0x7f0000002a40)=0x98) mlockall(0x2) 01:00:58 executing program 4: r0 = socket(0x0, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:58 executing program 5: 01:00:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:58 executing program 4: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:58 executing program 2: mlockall(0x1931ad35dfeaa436) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') 01:00:58 executing program 3: 01:00:58 executing program 5: 01:00:58 executing program 5: 01:00:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$lock(r0, 0x24, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) mlockall(0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x25a0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000040)={0x8000, 0x8, 0x80000000}) 01:00:58 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) socket$packet(0x11, 0x3, 0x300) openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) 01:00:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:59 executing program 4: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) 01:00:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:00:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:00:59 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x1f) 01:00:59 executing program 4: r0 = socket(0xa, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r1) setreuid(0x0, 0x0) 01:00:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000080)) r3 = memfd_create(&(0x7f0000000080)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8}) 01:00:59 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) socket$packet(0x11, 0x3, 0x300) openat$full(0xffffffffffffff9c, 0x0, 0x200000, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) 01:01:00 executing program 5: socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 01:01:00 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x80) mlockall(0x8) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f0000000340), 0x3da, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000000)={0x4, 0x4, 0x5, 0x800, 0xffff, 0x7fffffff}) 01:01:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:00 executing program 4: socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r0) setreuid(0x0, 0x0) 01:01:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:00 executing program 2: mlockall(0x4) 01:01:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:01 executing program 4: socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r0) setreuid(0x0, 0x0) 01:01:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 01:01:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:01 executing program 2: mlockall(0x0) 01:01:01 executing program 4: socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r0) setreuid(0x0, 0x0) 01:01:01 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040)="f1", 0x1) recvmmsg(r0, &(0x7f0000004680)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)=""/226, 0xe2}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) 01:01:01 executing program 2: mlockall(0x6) 01:01:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x18, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:01 executing program 3: 01:01:01 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000b34ffc)) setuid(0x0) setreuid(0x0, 0x0) 01:01:01 executing program 5: 01:01:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x18, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:01 executing program 3: 01:01:02 executing program 5: 01:01:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:02 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000b34ffc)) setuid(0x0) setreuid(0x0, 0x0) 01:01:02 executing program 3: 01:01:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x18, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:02 executing program 5: 01:01:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x25, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:02 executing program 5: 01:01:02 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x404, 0x0) r2 = syz_open_dev$video(0x0, 0x0, 0x0) r3 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x100000001, 0x40000) setsockopt$ax25_SO_BINDTODEVICE(r3, 0x101, 0x19, &(0x7f0000000200)=@rose={'rose', 0x0}, 0x10) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f0000000240)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000000)=r4) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000040)=r4) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) mlockall(0x1) r5 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) r6 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x9, 0x90100) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r7, &(0x7f00000017c0), 0x33d, 0x0) ioctl$NS_GET_OWNER_UID(r5, 0xb704, &(0x7f0000000380)=0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x3000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@msize={'msize', 0x3d, 0x1}}, {@access_user='access=user'}, {@nodevmap='nodevmap'}, {@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r8}}, {@access_any='access=any'}], [{@obj_role={'obj_role', 0x3d, '-#mime_type\''}}, {@subj_user={'subj_user', 0x3d, '\xfb!!'}}, {@appraise='appraise'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@obj_role={'obj_role', 0x3d, '/dev/video#\x00'}}, {@obj_user={'obj_user', 0x3d, '/dev/media#\x00'}}, {@subj_type={'subj_type', 0x3d, 'cpuset'}}]}}) ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f0000000140)={0x0, 0x0, {0x6, 0x5, 0x300c, 0x9, 0x7, 0x3, 0x0, 0x1}}) r9 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r9, &(0x7f00000017c0), 0x33d, 0x0) connect$bt_rfcomm(r9, &(0x7f0000000280)={0x1f, {0x8, 0x80, 0x40, 0x3f, 0x2, 0xc8}, 0x6}, 0xa) 01:01:02 executing program 3: 01:01:02 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000b34ffc)) setuid(0x0) setreuid(0x0, 0x0) 01:01:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x25, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:03 executing program 3: 01:01:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:03 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0x0, 0x0) 01:01:03 executing program 5: 01:01:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x25, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e5311"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:03 executing program 3: 01:01:03 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0x0, 0x0) 01:01:03 executing program 3: 01:01:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2b, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:04 executing program 5: exit(0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 01:01:04 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, 0x0) setuid(r1) setreuid(0x0, 0x0) 01:01:04 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r0, 0x5502) 01:01:04 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) fstat(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x20, 0x8, &(0x7f0000001480)=[{&(0x7f0000000080)="4f8e0334e6ad87e2ec8851b3712424d76b4a11636b2e1968ef0f2869bc6b3f792b808a937d0667b549e8f4de8c671e2b796019efd68751aee59eb0bd876f018cd85592d484428436eae83f58a60dfe", 0x4f, 0x7}, {&(0x7f0000000100)="a58b60391c7fa8dfeca6cc43f5eb35c34eac354088f305e905beec3b601e", 0x1e, 0xff}, {&(0x7f0000000140)="8f77a53eb4cccce64958aff614832c903ea634523adc07ad7e9f0bb60e399e3a2b1a442724f936f8c8500f1856fbe1d60e2e1a13af33a91f6ee07b28f0385aa4984b9aa2907e36b6fc930082611c24be2f88d60a32929e421f8160fc46b1a1ccbf7defef5b0ee758ace89daf2c8ceafc32fb61f4efd1bd7186e733efcd95d363240b3fa625e21f47a04cefd886a01bdaed7b381045a1a9b8080acf5a062f8f4ac494d59bfca9f870869c1967ba1699f7c3fe12ab77b1ba37ca9ffa55dcc8568dae0b283c48c405668fb4d56953c9ff4bc6abe4e109b2c8ce0927925a80969867b4a34c5a29e328dce69e8a", 0xeb, 0x1}, {&(0x7f0000000240)="0271d120b4e85224f892d9e06afdf4102ddbfa3737a00febc406ebab472bf49fd28147936245a6f2163c4fab5d9f1128c9d8c8f79565707d6ceaa2d2483f6c3839bb1ae45d4397c75f65a8261695ff9d0845d4a5acc5f93dc7aa10cebde9a6d362e3618cd9d1f002309c74e6f2f0137d62d78e7a2692e1eeb2c168dadf0901611d86ca95101baf9a16af36c37ab9053463ab269b07937b9244919cd843f6089f5440d10f082234b5dd15ff87e34c6841d335788817daf103eb107899807391dff0da8065ca502dd9634dd0f5544de63b85370a1f00f6f6de24b4ee383ee1a5775b67c476e402", 0xe6, 0x2}, {&(0x7f0000000340)="4e9a55af19c7b63aaaba927845cba4bb70d2feb4b0c657fc90ccf6c6f41f4f45a835c17095efd88869313a19d61f40ff9677542a1cb28288e685ae9c828d5bacd3044931a6058a18992f8f316fe25ca9fff04f3feec96148b40afbdda607227b272c12047db00619219144fd9fee9b2c009abe8a43a6f34735d439b26c6114b94d604c1216b02e7322299ff94520a076319648d09cb39528a5", 0x99, 0x6}, {&(0x7f0000000400)="0a234589427f018ed96cbfb36caa189a88e71f4713", 0x15, 0x2}, {&(0x7f0000000440)="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", 0x1000, 0x7f}, {&(0x7f0000001440)="b802", 0x2, 0x3}], 0x1, &(0x7f00000015c0)={[{@uid={'uid', 0x3d, r1}}, {@nojoliet='nojoliet'}, {@map_acorn='map=acorn'}, {@nocompress='nocompress'}, {@cruft='cruft'}, {@cruft='cruft'}], [{@dont_measure='dont_measure'}, {@appraise='appraise'}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'selinux'}}]}) 01:01:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 636.769473][T10991] input: syz1 as /devices/virtual/input/input5 01:01:04 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setuid(0x0) setreuid(0x0, 0x0) 01:01:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2b, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) [ 636.906689][T11000] isofs_fill_super: bread failed, dev=loop2, iso_blknum=16, block=32 [ 636.930657][T11004] input: syz1 as /devices/virtual/input/input6 01:01:04 executing program 2: mlockall(0x4) 01:01:04 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ftruncate(r1, 0x200006) sendfile(r0, r1, 0x0, 0x8000fffffffe) 01:01:04 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setuid(0x0) setreuid(0x0, 0x0) 01:01:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2b, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:05 executing program 4: r0 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) setuid(0x0) setreuid(0x0, 0x0) 01:01:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r2) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x44d) 01:01:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) mlockall(0x1) socket$inet6_sctp(0xa, 0x4, 0x84) 01:01:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2e, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:05 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$netlink(0x10, 0x3, 0x6) splice(r0, 0x0, r2, 0x0, 0x422000a7b, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2f0000001c0005", 0x7}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 638.064328][T11045] netlink: 27 bytes leftover after parsing attributes in process `syz-executor.4'. [ 638.090956][ T25] audit: type=1800 audit(1572483665.855:89): pid=11021 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17160 res=0 01:01:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2e, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @multicast2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r2) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000100)="16", 0x100000, 0x8055, 0x0, 0x44d) 01:01:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e96", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0"], 0x0, 0x84}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:01:06 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x9}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) sendmmsg$alg(r1, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) 01:01:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2e, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) [ 638.508151][T11061] ptrace attach of "/root/syz-executor.3"[11060] was attempted by "/root/syz-executor.3"[11061] 01:01:06 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) 01:01:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2f, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:06 executing program 5: setrlimit(0x4000000007, &(0x7f0000a9cff8)) creat(&(0x7f00000016c0)='./file0\x00', 0x0) [ 638.865623][T11077] netlink: 27 bytes leftover after parsing attributes in process `syz-executor.4'. [ 638.919425][ T25] audit: type=1804 audit(1572483666.685:90): pid=11074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir465904200/syzkaller.sALGFc/124/file0/file0" dev="loop3" ino=27 res=1 [ 639.043494][ T25] audit: type=1804 audit(1572483666.735:91): pid=11074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir465904200/syzkaller.sALGFc/124/file0/file0" dev="loop3" ino=27 res=1 [ 639.127256][ T25] audit: type=1804 audit(1572483666.755:92): pid=11074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir465904200/syzkaller.sALGFc/124/file0/file0" dev="loop3" ino=27 res=1 01:01:07 executing program 2: mlockall(0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x2, 0x1, 0x7, 0x1, 0x6, 0xbf, 0x3f, 0xee, 0x8, 0x886d, 0x200}) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0xffffffff) fcntl$notify(r0, 0x402, 0x100000010) 01:01:07 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) 01:01:07 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) [ 639.696073][ T25] audit: type=1804 audit(1572483667.465:93): pid=11094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir465904200/syzkaller.sALGFc/125/file0/file0" dev="loop3" ino=28 res=1 01:01:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:07 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000140)) 01:01:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2f, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:07 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000001140)='./file0\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1, &(0x7f00000010c0)={0x1, &(0x7f0000001040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x2841, 0x0) 01:01:07 executing program 2: mlockall(0x1) [ 639.858998][ T25] audit: type=1804 audit(1572483667.625:94): pid=11098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir923491002/syzkaller.8oSkh7/105/file0/file0" dev="loop5" ino=29 res=1 01:01:07 executing program 5: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 01:01:07 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) 01:01:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x2f, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632c"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:08 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) creat(0x0, 0x0) 01:01:08 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000001080)=@l2={0x1f, 0x7ffd, {0x1, 0x30, 0x3, 0x7f, 0xd9, 0x1}, 0x7fff, 0xff}, 0xfffffffffffffec5) bind(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0xb, &(0x7f0000000240)) r5 = dup(r4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) r6 = inotify_init() lseek(r6, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) r7 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000080)=0x58d, 0x774) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r7, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r8 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}) fcntl$dupfd(r8, 0x0, r8) r9 = dup2(0xffffffffffffffff, r8) getsockname(r9, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r10, 0x6, 0x18, 0x0, 0x0) r11 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syncfs(r11) ioctl$sock_SIOCINQ(r11, 0x541b, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_INFO(r11, 0x0, 0x60, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x44) bind$inet(r11, &(0x7f0000000340)={0x2, 0x4e21, @rand_addr=0xffffffff}, 0x10) connect$inet(r10, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @mss, @sack_perm], 0x4) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r10, r10) fcntl$setpipe(r10, 0x407, 0x7ff) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 01:01:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) creat(0x0, 0x0) [ 640.939875][T11152] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:01:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:09 executing program 4: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xfffffffffffffffe) socket$inet(0x2, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) 01:01:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086607, 0x20000001) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xf) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1c0) gettid() perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 641.324922][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 641.330752][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x22240, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000040)={0x56, 0x7, 0x2, {{0x49, 'wlan1posix_acl_access*cpuset-bdevsystemeth1]wlan1self,keyring\\&\xba*{keyring'}, 0xffffffff}}, 0x56) mlockall(0x8) 01:01:09 executing program 4: add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000380)='./bus\x00', 0x143042, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x87f1a7) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x0, 0x1, [{}]}) 01:01:09 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000001080)=@l2={0x1f, 0x7ffd, {0x1, 0x30, 0x3, 0x7f, 0xd9, 0x1}, 0x7fff, 0xff}, 0xfffffffffffffec5) bind(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0xb, &(0x7f0000000240)) r5 = dup(r4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) r6 = inotify_init() lseek(r6, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) r7 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000080)=0x58d, 0x774) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r7, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r8 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r8, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}) fcntl$dupfd(r8, 0x0, r8) r9 = dup2(0xffffffffffffffff, r8) getsockname(r9, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet_tcp_int(r10, 0x6, 0x18, 0x0, 0x0) r11 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syncfs(r11) ioctl$sock_SIOCINQ(r11, 0x541b, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_INFO(r11, 0x0, 0x60, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000400)=0x44) bind$inet(r11, &(0x7f0000000340)={0x2, 0x4e21, @rand_addr=0xffffffff}, 0x10) connect$inet(r10, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r10, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @mss, @sack_perm], 0x4) setsockopt$inet_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f00000000c0), 0x4) dup2(r10, r10) fcntl$setpipe(r10, 0x407, 0x7ff) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 01:01:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0xffffffff000, 0x5}) 01:01:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0x90d5, 0x43) io_setup(0x8001, &(0x7f0000000040)) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) creat(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000080)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) lstat(0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000010010006000000000002000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="100004000000000020000000000000"], 0x5, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000006e40)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="294c61e0c9d77396e94cf3fce366", 0xe}, {0x0}], 0x2, &(0x7f0000000300)}, {0x0, 0x0, &(0x7f0000004ac0)=[{&(0x7f0000002740)="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", 0x879}, {0x0}], 0x2}], 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1568090194b3c9f904077f69affb736d10b2e0ff4c418c242f575e402becb68519"], 0x21) r4 = dup(r3) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 01:01:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) [ 642.524918][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 642.530742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 642.684893][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 642.690698][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000580)={@loopback, @empty}, 0xc) 01:01:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:10 executing program 5: r0 = socket$kcm(0xa, 0x100000006, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x80108906, 0x0) 01:01:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0x90d5, 0x43) io_setup(0x8001, &(0x7f0000000040)) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) creat(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000080)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) lstat(0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000340)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000010010006000000000002000100", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="100004000000000020000000000000"], 0x5, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000006e40)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000000)="294c61e0c9d77396e94cf3fce366", 0xe}, {0x0}], 0x2, &(0x7f0000000300)}, {0x0, 0x0, &(0x7f0000004ac0)=[{&(0x7f0000002740)="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", 0x879}, {0x0}], 0x2}], 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1568090194b3c9f904077f69affb736d10b2e0ff4c418c242f575e402becb68519"], 0x21) r4 = dup(r3) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 01:01:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 01:01:11 executing program 5: 01:01:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:11 executing program 5: 01:01:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:11 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 01:01:11 executing program 5: 01:01:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:12 executing program 5: 01:01:12 executing program 3: 01:01:12 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r4, 0x0, r3, 0x0, 0x1000000000000003, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$packet(r4, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 01:01:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:12 executing program 5: 01:01:12 executing program 3: 01:01:12 executing program 3: 01:01:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:12 executing program 4: 01:01:12 executing program 5: 01:01:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:13 executing program 3: 01:01:13 executing program 4: 01:01:13 executing program 5: 01:01:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:13 executing program 3: 01:01:13 executing program 5: 01:01:13 executing program 4: 01:01:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:14 executing program 3: 01:01:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:14 executing program 5: 01:01:14 executing program 4: 01:01:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:14 executing program 3: 01:01:14 executing program 4: 01:01:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:14 executing program 5: 01:01:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:14 executing program 4: 01:01:14 executing program 3: 01:01:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:14 executing program 5: 01:01:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:15 executing program 4: 01:01:15 executing program 3: 01:01:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:15 executing program 5: 01:01:15 executing program 4: 01:01:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x10, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 01:01:15 executing program 3: 01:01:15 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 01:01:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0x31, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:15 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38ee38898fd565"], 0x0, 0x9e}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:01:15 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) io_destroy(0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 01:01:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) [ 648.252250][T11372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 648.453156][T11381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:01:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:01:16 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000d83f60), 0x0) io_destroy(0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 01:01:16 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_destroy(0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 648.565735][T11386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 01:01:16 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='#!$\t'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 648.795068][T11395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 648.865905][T11396] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 01:01:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:01:16 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d7", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8"], 0x0, 0x74}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:01:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 649.089623][T11403] ptrace attach of "/root/syz-executor.3"[11400] was attempted by "/root/syz-executor.3"[11403] 01:01:17 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='#!$\t'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 649.313454][T11414] ptrace attach of "/root/syz-executor.4"[11413] was attempted by "/root/syz-executor.4"[11414] 01:01:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='#!$\t'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:01:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:01:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 01:01:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) r0 = socket(0x10, 0x20000000003, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8001b00000000000000000000080009000d000000", 0x24) 01:01:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='#!$\t'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:01:17 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0xffffff80, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001140)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) 01:01:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:17 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='#!$\t'], 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000240)='syzkaller\x00', 0x0, &(0x7f0000000480)='keyring\x00', 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:01:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp6\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/186, 0xba}], 0x1, 0x0) 01:01:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:18 executing program 4: dup(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) 01:01:18 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000003, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8001b00000000000000000000080009000d000000", 0x24) 01:01:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) [ 650.694906][T11461] input: syz1 as /devices/virtual/input/input7 [ 650.913742][T11465] input: syz1 as /devices/virtual/input/input8 01:01:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0xf, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) 01:01:19 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000003, 0x0) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8001b00000000000000000000080009000d000000", 0x24) 01:01:19 executing program 3: r0 = memfd_create(&(0x7f0000000440)='\xb3', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x5b) 01:01:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:19 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', 0x0, 0x0) 01:01:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000300)='R', 0x1, r0) keyctl$read(0xb, r0, &(0x7f0000002240)=""/4120, 0x1018) 01:01:19 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 01:01:19 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="edbfd8cff53a27b18901"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(0xffffffffffffffff, &(0x7f0000000080)="fc0000001c000725ab0925000900070007ab08000800000081006193210001c000000001000000000000000000039815fa2c1ec28656aaa79bb94b467e0000000a000200035a0201856c256f1a272fdf0d11512f3cadd44000000000008934d05cd3f3187a617cd5000000000000002c05defd5a32e2ab8207000000ec18444ef92e475bba4a463ae4f5566f91cf190201ded815b2ccd243fa7ded94e0ad91bd0734ba3fcd8a57d47689cd3dd16b17e583df150c3b880f411f46a60467b4d5715587027177", 0xc5) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 01:01:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) [ 651.750218][T11503] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:01:19 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:19 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 01:01:20 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) 01:01:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:20 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x1f6) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10, 0x80000) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1001080}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x4) 01:01:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8000, 0x9, 0x0, 0xb, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r3, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000a40)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) 01:01:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1, 0x7}) socket$isdn(0x22, 0x3, 0x67) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000180)={0x6, 0x32314d4e, 0x2, 0x800, 0x2, @discrete={0x1, 0x5}}) mlockall(0x8) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mountstats\x00') setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000040)=0x1, 0x4) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x70b200) 01:01:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:21 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad4f79a4d2a5e964644e4f7edcd054a0944513", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8"], 0x0, 0xaa}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:01:21 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8000, 0x9, 0x0, 0xb, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r3, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:21 executing program 2: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) mlockall(0xe784cd0a4f49a261) 01:01:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000200)="0c96fadfe67d57", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8000, 0x9, 0x0, 0xb, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r3, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:21 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x1f6) accept4$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10, 0x80000) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1001080}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x4) 01:01:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) mlockall(0x8) 01:01:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000200)="0c96fadfe67d57", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:22 executing program 2: mlockall(0x8) getsockname$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10) 01:01:22 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="23212409000000000000004576fce9e81c0161abe212280f382e343be1ed2836464b320d570f25eda7b90d9f1b14777dba014f129bd0fb9a11938f47ea25fd30dcbb4fcab5fee4d4ff7295"], 0x4b) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:01:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000200)="0c96fadfe67d57", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) [ 654.983970][T11608] ptrace attach of "/root/syz-executor.5"[11603] was attempted by "/root/syz-executor.5"[11608] 01:01:22 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) setsockopt$sock_timeval(r1, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x2710}, 0x10) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000002400)={0x0, 0x0, 0xca, 0x78, @buffer={0x0, 0x0, &(0x7f0000002600)=""/100}, &(0x7f0000002480)="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", &(0x7f0000000340)=""/87, 0x46, 0x10010, 0x0, &(0x7f0000000280)}) 01:01:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:23 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="23212409000000000000004576fce9e81c0161abe212280f382e343be1ed2836464b320d570f25eda7b90d9f1b14777dba014f129bd0fb9a11938f47ea25fd30dcbb4fcab5fee4d4ff7295"], 0x4b) add_key$keyring(0x0, &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:01:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8000, 0x9, 0x0, 0xb, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r3, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:23 executing program 2: mlockall(0x8) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x1) r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1200, 0x2d000000, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f00000009c0)={0x1, &(0x7f0000000980)=[{0x3, 0x5, 0x0, 0x7}]}) preadv(r4, &(0x7f0000000840)=[{&(0x7f0000000480)=""/13}, {&(0x7f0000000580)=""/57}, {&(0x7f00000005c0)=""/48}, {&(0x7f0000000600)=""/209}, {&(0x7f0000000700)=""/34}, {&(0x7f0000000740)=""/207}], 0x10000000000000a1, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r5, &(0x7f00000017c0), 0x33d, 0x0) io_submit(r2, 0x4, &(0x7f0000000440)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0xed847c73d0d159b6, 0x2, r0, &(0x7f0000000040)="95903a55fcf34da5e0b2bc8f84e10bcb8e9a035c1f9b191543113b3b4933588b1085da8ed4e39fdec6a0d353a8389236629295a06349bc12e4016667a8de010964b456e43009b21ed237644c06b737c2165ae962f45de436", 0x58, 0x2, 0x0, 0x2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f0000000100)="aef118888f7283a3f5509e779c06e21b08dfd3e44a7ef6b2c3956b797ef30ae93d090c925b08ee2af125fd511c3d1814748840b6eaa274db75c67f0d622e752566981391949e2929306a3197f354afc6f56765eb4aad81fc88c23ec1456b5f963a00c056fcb6153c369b923a864f365fee952b865e48a3ae38bfea4ce0d831a98f359e2e39b726b3a328bcfbfa445ca70c0cc8b06ead643afb166adbd3321b673232f1278026470b09c691a7395aee490ac52dc6d6c54716170e78fda04b85fc6f94ea670c4915bab35979f2", 0xcc, 0x5}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x3, r3, &(0x7f0000000240)="0e17065ce5b8e8788436e82ed75c1a73a00b3a100ac60d914f86f6f4763fa187689c52008a8aa3188b3412c98574b9558cb9d1224199108cd0329040f7b437941e8adb918978b9ce43312543adec466e53a4439ca06f1062f2d878497fb360a634057364e3936a3fe32be1d5ba640512d3dc06a4140729ef83ec8c3cc88e15e284a0f0d6fc85856598126b7a7db1e2d5f694c6925c3083d7093a28c6611b3aa576b0c420b7e92a032bd881c54664b95ac2", 0xb1, 0x1, 0x0, 0x2, r0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x3, r0, &(0x7f0000000340)="7e22358ce1073ad5b254ab983585aa86023b552298b0f835bc7cd43131a76e1811eac1b93e3cf0f8040c8aa081ad9c43fc194618b351d2e396c320c9ced6576a006375481108195632c0aee58de34b043c4c7434289464a738173184ad605122413dbc0bd31b5fedc8ee938f832824c465e037b20a6403f2ec178e2ccaea79785ea89877fc5690593d7e6b49148eb33dc29a4afa34f0343a1cf0cfef9fbb3ed212b8565287d43707b0", 0xa9, 0x81, 0x0, 0x2, r5}]) mq_open(&(0x7f00000008c0)='net/unix\x00', 0x0, 0x10, &(0x7f0000000900)={0x8, 0x40, 0x3, 0x4, 0x7f, 0x6, 0xbe0, 0x7}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vcs\x00', 0x101000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000a40)={0x10003, 0x1, 0xd000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) 01:01:24 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x40, 0x0) utimes(&(0x7f0000000600)='./file0\x00', 0x0) 01:01:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="4548c1c6a1924085de00ab16d90e45f50cb60a813123c1b5716c8ea92c19a6a03e327099f82f8d040db5c27fbb9f5e87092dd5fc272f7edc9e6ebc7fda1be9e030a4486bcaf33f527a0937cc0c1c9a0c6d81fd7329d5250483127550eaf03100f910ba5835425a9d9705dfa393", 0x6d}], 0x1}, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x0, 0x0, 0x0, 0x135}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000280)) ptrace$cont(0x1f, r0, 0x0, 0x0) 01:01:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) 01:01:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r1, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x8000, 0x9, 0x0, 0xb, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r3, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 01:01:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r1, 0xc0345641, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={r2, @in={{0x2, 0x0, @rand_addr=0x400}}, [0x0, 0x3, 0x0, 0x0, 0x4, 0x3, 0x8, 0x951, 0x7ff, 0x9, 0x5, 0x3, 0x4, 0x0, 0xfffffffffffffffe]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={r2, 0x57, "81a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c8328"}, &(0x7f0000000440)=0x5f) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r3, 0x7, 0x10}, &(0x7f0000000180)=0xc) mlockall(0x8) getpeername$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @null}, [@default, @null, @rose, @remote, @default, @netrom, @netrom, @netrom]}, &(0x7f0000000080)=0x48) 01:01:25 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1c, &(0x7f0000000000)={@local}, 0x20) 01:01:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:25 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r2 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r2}, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) r5 = gettid() r6 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r7) sendmsg$unix(r1, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r7, 0xee01}}}], 0x40}, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) r10 = gettid() timer_create(0x9, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r10}, 0x0) r11 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r11, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r12) r13 = gettid() r14 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r15) sendmsg$unix(r9, &(0x7f0000000280)={&(0x7f0000000180)=@abs={0x3}, 0x6e, &(0x7f0000000100), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r15, 0xee01}}}], 0x40}, 0x0) r16 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r16, &(0x7f00000017c0), 0x33d, 0x0) fstat(r16, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="020000000100060000000000040002000000000008000400", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r17, @ANYBLOB="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"], 0x44, 0x2) mlockall(0x4) 01:01:25 executing program 0: 01:01:25 executing program 5: 01:01:25 executing program 0: 01:01:25 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:25 executing program 5: 01:01:25 executing program 4: 01:01:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) 01:01:26 executing program 2: mlockall(0x8) ioctl$SIOCAX25ADDFWD(0xffffffffffffffff, 0x89ea, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast}) 01:01:26 executing program 0: 01:01:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:26 executing program 5: 01:01:26 executing program 4: 01:01:26 executing program 0: 01:01:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff", 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000380)="d0"}, 0x40) 01:01:26 executing program 2: mlockall(0x0) 01:01:26 executing program 5: 01:01:26 executing program 4: 01:01:26 executing program 0: 01:01:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000ac0)=[{{&(0x7f0000000840)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000740)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_config_ext, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x100000000) 01:01:27 executing program 2: mlockall(0x8) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x3, &(0x7f0000002100)=[{&(0x7f0000000080)="1b425f566325787c57132809fffa53aeab978b52e2aba09db02d8ac5d21d0f9f85c907ccbb411576eaaefaec70115cd2bc4c7fabff64102ddb9b23d6fa0180a0dd00812cdad74d2e9dfbd47118198ac0db5a1fb0000cdc967898c567c6457aa7160f5a63eb2a5c087f26216a3224babeebf6b535c3b6bce714a71f71ce332cb992907ec126728f1d2827e10c6725d8623a78697bfadc73263108a774887da5962cbaf0f2d51aca2d67c761d0306aa7c4554e4e6f69c32203f7652431d2d718c15a4bad9c4103658c0beb8587875fc6aceefb88e5b5d17added85f95161572f1bb0b6dbc24f7977d73b6f7177377c5281ccf051cc32634656e53ed2eb6a8daf92609c31791cc1a4685c2fdc3cfe0a06f8012df3cf0ac8d31eb0e5756ee8087c3e60cae20538dbd54165fbef95e0f27a97a145e052c67735a30d6978bd8e407959ba2eab9486ae745d37b9358212eb1971c6546ce7c4b60703fe658a42707fa6ccde8542c25d7a221a78229af8a7fed3bb0a71f35293703250effa0b8c0e99bc5a1563001db25940a9bee088fcdf86e358f7eab9ea239764ee9b73990e7a71a67ef3e4617d05d3b8a3a73c364a1dbf187e3ccb6eed12aeae0f727349e5652f3ab22707211a3f29dd5eb5b15f88fd84b188d0f0c44eb88aa1fab4d9254f70a6fc590ddcb2bc630ba08b9e1112f1f58778ad3e018ce5fa3aa96a8625cd8fec564a333de20b43e1e7856ebf01d0b64954d929256bcb2f336e9e89eef2937faec96c972dd92df53941e2e6e6553f2a4ef164913acc39944fc248f2ba9064569161fc97b8db82abee91f35aad5b9e0c0c42bf2abf73b059f663fa218bcc3a201752a634b425aad00d3c325e16276e8a3cc42e526369d8246efd17d24802e86c15b69e5984123eaf94a9e71dfee9e77c9d6a6c79a6940e0082c2861b45e2b783fd5f27c059791794c170c502e96fe5b228043181d812946189e169303b6ca3fd9098662f8d962e5a176fb62e3694dd7b0a20ee25a8dc3de4d0fc11f105d4222dbc2a3d44184eb1ebc048a8ca2196e68c75480837d27758ac98d731d19445869a6f9a1ea4682ff362ffc4671132e7f5fefa941a9f828b51740603ea7dd3e332a28d62153475d3070d3399faaa7474791adf74765b93b5bfe2c6b31ed06be0a6a1827e0d1547158e890dc69984622c079cd2e3e3c88709a7b50e34e8d9997f470999bbd41fc7f1edcc1b9bcc57516809392a1d4aa762a7f5b599e15be2438c955792b9038e1d456f1100433f7dce3797c85f904d3f9e64650427c94cf48677a676bd17c426a7512895aef720bed57b64c96e17d1ee14c560dc4ac873c46774b25532cfd00f061ad5f2dbabfbe153d5644afb635471a081e9c2ca4abfa5294221ec15c77a0389a9faf03d11a5cfd28ed102b49f82352fd238d4822536433dbba560fe1bc6fb1b33f45d7f507ad90dca8fa45a87195a6fd71c0610aed4da847bcd5b2d354641a7a3a5919de3629f2e336c2f263feae5243921c098d493af8499c4eac1dcce8438457222ee663fbde27dd29b28fb2b4c16d4fa89c3b7311faa30bcf3f21c1620aa934d889c93a2a8da6936915e72e5fa8a9221203bba24bb4ae5e8b80297b577818f9c2ff77bc7413783b7e448f74a3d5a57dabed34936f90d338d28295b27051a200f53961a24f9502583b3b87d42849957ab1ff9a918ac8b109b7b1b154c8514bf966e197c278aebd6feee1960213479df3f43f0f37e43e43b427a0199bdd884de317d6bb167bd8e10bfbf578140209898a97cb3c42debb28911cf61dc5fdbae4766fa4547281fb3226dcd652f9c9f0eaf957e3fe981b546b1c7203cc0b6a7f19e313475c7dc0a6f62f6d77b1b5aee1ee488768dafd568745160285a63830334d625e109409eb5466a263932ca13a1fb90f10bf92038d30268184136479f937b0a36fa4d2bc86307a02eb6870dbc99abfc07538c8711768b0d0bc4f373a65acd92a054b935659830c300c72c79f2482d407263e3164c3322dd243962550c9253e9e0e8846dce992614cf600b0c24af0fc1d51e877ff3bd79982f1c6f8c9c09768624c7bac60169159449c69965bcae2d09752f50745e6a17812d91a81cee3f7ae9f03f872f704d7b7b03a10b4ed85b3de9e35847b8a6ee3435867cd61ca7e772c12d5873d3830266165280e732ca74a10f23b0c3b90c8f946578a09c363fa2b9e3a1712a3bcbd48babfcc38390325729db61fc7f346c054d914e0b9ef51ee49818d5c687337ea7f6465315c7dc98b3d56daba7073f84dc70ebcb2454f9c52ed5f0ee715c74fa459d920c72c950a20f6b981147a821064cdfd4fb5bebce4f633c518da537ee2740a9f73d3203de59cb94ef5339294de5e932f4adc1a3fbfd2a8da06260ca22d32eb0f4794d348ea223664d73a49fb68d78c9e208c17c222dce425c4a72b22a27ce27b0298d8f5486279b97a75f82df814b4efd4c4c5d4fdd3e3ec9396cab17b696eece657689f25a499654a8c489bd297e8008a32dfc3254f37c4d3c7a736bb2f614b7e83ef918a0413e1de027018c800f1201926d9533b7de34387d3c2cea44f76692549200be6ab982f8269264a97faf0fcd26fd5d4069b6365a59cdaee6f2fb160c50a58cde16b67c4294898ab41e31300815b4f127b846fa3b68f0ef2f5f38ffdeb83154f098d3dd6a6f2d5bdd2a40f765b2493380f793ae9ccd860e852c76aed5ab767746bd6d48c4c71a540c579b920920979687e18ea1b9d15c79c8022b54582ee08bb69cf8bb7fab5c8102f5d597c935b094d4221d2e9d48c0d067199418f79890cf39bbd8cb4ab0d6fac3a0b3db33741c0136af53b93ceb6195e777b20e4fc479c550970a7eb12d1c82f74bd8731208c8cc9585ad33773c2d3158574f935068af3a20e163b4526bc4fa67292c8e43d457cb962116c862e59bed03f695a45cc72cd352e2e4e8a967cdb18b555b799423fcafeffde5a27338adc1d5f7fa2a136f314c359ca69f1ab3a08554d527309c8926c134c58878aa9a085d0eb685478289fce7bb9c5a561deb2ba9fbbff39e787f5567949352b67fdc9a6826b2b5ecf42936da66d7206f10994cbb7b8b7a07fce1496c962a55851d8a4e4ed3b44ee1e51fe8742f3ab6fc4c61d89bfea573171f7c83da51e471e8a9f108d17b489367a43cff0036e48db63fe4f1e2d6b4f8691353845e1e9cf82958efe7c5210349ab186578fb5b0144420c7515af7ad0a9a6bc106875c27a25aae112f73e5525fbcded5f3c566eb9ebfba61bdce3bed020319b11e5d167ef24c0ffc41dee223551dcb7d163ac51bdbdae6fc2677a6f4e4592f1a9257bb09021ae211512e56821432adf0aacef093994394b37c26beb547702ce406b63a02918f3dc95260c384ae9de19db833f627504a658d19c94dd1ec986daf01e309f99d092d35a1816eef32586f30a7f13d24d164add114143e7d6c28312f28676431d0e7bc8dd4733ae76a18757a26e28824da7971aa615026c04e456f79a100f2c7634f1643d5007fb36a452d051d0737225c2dc58d64ce6fbbb3ff91aed707ff7ca922983c6f3760f4d62ce148acbca1b8be4bdf07344f41cbd9553cbb0fb00dce9a3fd1368efddb2a62502d59c9c1e11bb36a5563d93f9332bbdc5039df411788ce8884367eb43fc53e918ca2ce01e8d3fba6e70d5bee08fd5118451d4d29a5ca577fa99d1574ff2215d94576b6f7513ba0fd2db3d980a3140945632a7d64274b76c0b7678691ac23ae7c76b7d7a8c4504de6a5fa08f8d3664d92cb271a71a60793d678bf4be9f8a72c2264e06c37112848179f9a10ca36c496cb9aaefba6f11b7f089838ad3163ae101d5f2443ebc13eabc282e69639b08d5a63e117e63a2ed0ac55131230424b9f14c67dff382cbac86cc52dd90e74cc6efd41dd125b96407c5dc42b8f23f7398b1a8342250c7d6571839a3c2cf826e0189545faf5ef661f5701102483fc118a86a9f7b72b3242a3b92e6f05fec04ed8325be457e5877ed0383a4df965e0f0e41c6936101029d2af50542286d3449c2f7f5bcfd6c4e8affbb8669135e589ae0e4d9802aeac9d02e9ba0e88470af80d2209cc819a4bfe032f03865f0e4d37bee302d0e82b66ffd44fc60b21326525b28eae36c83d9514ee17c6ac5dd2f7c8eb1c3874191fe161df9d81e27ad29f36f2eedcf05b4d0738173023432a38f0c8774c5b0744bc357dfc4a8a5f13bc145f5be6bb2e4cf155ea8dfe52bde98bd54769ce6f1b3c01a94bdc618f2b11e23cdb7e14383782757fe2421657c199fadf5a7d53fec75c72851388bb21d10b953f93527495a34ba26a8c70bf365930280090230e5a310ac011d8678ae9c082ca95e412e1d8cc0961683c350a070844a2daff3ff2427788e964fcce913c55ffcb6e3440aca81bfad4f718195f5882fc6ef61ab590f5ac3d1873719a58aa0435a86a34cb69d7a2c4cdae5caac173f9efcec5f8c3279459e9db640def1ee26ddbb2e78ccaf19edf2111faa8075d0e4e8f57a1296577cd4fb36afba70dc2137d936b2ed5d1d87d40b9266d0b07a9e4f18c17f8142624f4a635c1f40e9952e11060ee02816b8b55a06a6f29a99537b15b167b32a5fb7f8537a504c8febede3c3963d394de2ac00c01e6631c1af1d3f56593d12e26d425406aac72d1b7037a5e7f61241b999131faba61fb7e2c04a43a2a79344271070094a3027fe6565daf5b08ec16ce4a50b068be1212a65c0748373ee3a4fad83fb1f69f4a08a984e6fd76cc261db15fbbaeff9454ab34fb4d3aff00717eef656ddbb72b5e2fd1748d8ad2f2bf19571d0ade264ba73307e980e169ba38c9948bbf4213cf69ffffe10053ffe2ffde8f14d0f58378a1df52d2ee1759206741a3d860e75ad4ef313bcd5767b130d562ac4d48e4d38d168843ab92b628a4b388e4dcd42f607fef65c36fe4c1a87d48870ff5362fe1764081cff73d9cd9301ebe15c1646e5c3dcbc16f0de96b32e28d8ba0e524a9b65d653a19b706858a9a1c5b9c8fea53341511c7d4fba873c6603833182105a1259ba7a3baf8e726bd88a861fc92d5ec393f76a7696a769f035de68d839e57b22ee194585a6444a05d3494b15e2808cfdb94bfbb6e72cd86635911108078fc67e98914b9faeb9b4ecf00c705782ea3ba764c16d9cecdb66f1bfa95b11241da038f02ddc8bc4223c3e4032acfb98a2b550f310bc90b6f747ab1fc84deadb76d981e1d30c23c34fb175c3485daddcf17137d1c5206cc11742a6d48ebc575f48518f355b9d659551cafeaad9fcb7d51de4e8100a599f9de044cca5e4d1dcdb046bbc2354d9dc26e3168cb984c1e8fd32cca79db41b49faf16100ab4f3063ae0b3034d8d4fb679666af7b9c23a2ea5166ce1e979b860e117792a031df53b317e6867a3fd4b8ed2dc959d75428820473e45fa575b6d9bb2444bd8372e66bae3682e3b8ca39e90410ea227ea19d929238f1dece9c3e66d47194280e9b108299f88f814c1b207cbc66056b2ec072a4f37549e3cc295fbf670fe65e9be2034e29f09509e74d8478505c361f099852ee82219427ea68172c42f09f17eccc019e90a1a3a84131153a22512b7aba995917fb6dd6954375825da47133261e37252372a997e06a7c1b79702095c632aeec7db3ad3c03c3451759b4ae6efff9299c6f6e88830048a3833ad738acf7e06f317e1a98d025a7b3c354d7ec2b2214bbb76cb2350d8a0332baa94978db66f3061f6a6deabc80de82cce8b83c0ce1c288f34e67bedfb307efff20c0c83dda1ceb6a", 0x1000, 0x3}, {&(0x7f0000001080)="3530eeec7ae4e0abdd988258d6e376097ed3d92efe1251855ec8c7c57d68a694864fdae2a69d51a67957a0e5828c43a5f0df0245d9edd2af61ca4a989dc2c29e389dcc77ed41d23244a32703cf5b3d86a39a6ff681513626682318574f599cdeb7fa0ff7c62654e7002b27689db71504ad9dd2863ba4eb3518", 0x79, 0x8}, {&(0x7f0000001100)="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", 0x1000, 0x3}], 0x3000, 0x0) 01:01:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:01:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/787], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 01:01:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000240)=""/107, &(0x7f0000000040)=0x6b) 01:01:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:01:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/787], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 01:01:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:27 executing program 2: mlockall(0x7) 01:01:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:01:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @random="8c1b1069f01c", [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=0xfffffff8, {[@timestamp={0x7, 0x8, 0x5, 0x0, 0x0, [{}]}, @ssrr={0x89, 0x3}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 01:01:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x40) 01:01:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x16}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x7fffffff, 0x0, 0x0, 0x82}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x919d67ff2505acc9) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0x5, 0x4) mlockall(0x0) 01:01:28 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x80000000000004) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 01:01:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b70200008cfe0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00a0c5008500000026000000b7000000002000209500000000000000a5d45a695ecbcaf2b8e198452498a0055d5bc0842e6c1a3f1bd8c37784ae4eb241100a1304921fc6070200252b47ce97d5aa6e18eecafbb6b6b59a20c125af2a2169719e93e4d9960a71b3e52506794a3afef7d738e7928f2e4ef01890c04b3364d07e0d8f4e71cf53c91be6b9f8345f1755a1125895b1399807cfee2b6395db8f35a0dc420c712c711658cefc59b2abdab83859546b52423b155687afc22bfd7c3f91e279de71faf9298d1da8ac72786f703512a9683e53119caf5c11302fdf8c9ec9ce1427c7688c8eabcfe7b642f43f1d5a0873b7d8cd7180451e21940000006c1b0b3a63e1a7c3b9e02305d85f95b287ff39d343dc59348e993ce667570f0000000000b94d18bcd61f83148372b1f8155e632cca10c6faeb25"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x40) 01:01:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/171, 0xab}], 0x1, 0x300) 01:01:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r0 = syz_open_dev$sndmidi(0x0, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) dup2(r1, r0) 01:01:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x42, &(0x7f00000000c0)={@local, @random="8c1b1069f01c", [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @rand_addr=0xfffffff8, {[@timestamp={0x7, 0x8, 0x5, 0x0, 0x0, [{}]}, @ssrr={0x89, 0x3}]}}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 01:01:28 executing program 2: mlockall(0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) 01:01:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @loopback}, 0xc) 01:01:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff28}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="0c96fadfe67d576a000000e4ff00", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x40) 01:01:29 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000140)={0x7, 0x0, {0x0, 0x0, 0x0, {0x0, 0x6}, {}, @cond}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 01:01:29 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) 01:01:29 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x180, 0x0) mlockall(0x2) 01:01:29 executing program 3: getgid() r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000005c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 01:01:29 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) r5 = fcntl$dupfd(r1, 0xa0f, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 01:01:29 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="56f4"], 0x2) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x4) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:01:29 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 661.690721][T11829] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:01:29 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) r5 = fcntl$dupfd(r1, 0xa0f, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) 01:01:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth0_to_bond\x00'}) io_submit(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setreuid(0x0, 0x0) 01:01:29 executing program 2: mlockall(0x8) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x81, 0x506202) [ 661.795070][T11829] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 661.859334][T11829] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 661.903283][T11829] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c01c, mo2=0002] [ 661.952483][T11829] System zones: 0-7 [ 661.962290][T11829] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 01:01:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) nanosleep(&(0x7f0000000140), 0x0) 01:01:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:30 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffe6b, &(0x7f0000000080)=[{&(0x7f00000000c0)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400f47e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 01:01:30 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xeaf305b9b2439164, 0x4) mlockall(0x1) 01:01:30 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) gettid() tkill(0x0, 0x3b) syz_emit_ethernet(0x3a, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote, {[@noop]}}, @tcp={{0x0, 0x0, 0x41424344, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 01:01:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) [ 662.612381][T11888] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 01:01:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='journal_path=.']) 01:01:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') fchdir(r3) r4 = inotify_init() inotify_add_watch(r4, &(0x7f00000000c0)='.\x00', 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000040)) getdents(r5, 0x0, 0x0) [ 662.955498][T11888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 663.019991][T11909] EXT4-fs (loop1): error: journal path . is not a block device 01:01:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 01:01:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000880)={@remote, 0x800, 0x0, 0x3, 0x1}, 0x20) 01:01:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 663.108821][T11909] EXT4-fs (loop1): error: journal path . is not a block device 01:01:30 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0xfffffffffffffe6b, &(0x7f0000000080)=[{&(0x7f00000000c0)="24000000150007031dfffd946fa2830002200a0009000000741d85680c1ba3a20400f47e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 01:01:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000240)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd02000000b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='journal_path=.']) [ 663.333548][T11923] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 663.422146][T11923] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 01:01:31 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 663.683693][T11932] EXT4-fs (loop1): error: journal path . is not a block device 01:01:31 executing program 2: mlockall(0x8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_acct\x00') accept$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 01:01:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 01:01:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 01:01:31 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="e6ff03005400005531fe0500fac9065f076748b4f245", @ANYBLOB="740081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x4dc18f7b9999563f, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}}, 0xfffffffffffffce6}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 01:01:31 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) sendmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000002280)="bc", 0x1}], 0x1}}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) 01:01:32 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:32 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@ipv6_getaddr={0xfffffffffffffcba, 0x16, 0x0, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @mcast2}]}, 0x2c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 664.283500][T11950] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 664.302558][T11950] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:01:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000040), 0x4) [ 664.344977][T11950] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 664.361656][T11950] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 664.402276][T11950] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=e002e01c, mo2=0002] [ 664.471881][T11950] System zones: 0-7 [ 664.515616][T11950] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 01:01:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(0x0) close(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) 01:01:32 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 664.610026][T11967] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 664.629954][T11967] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 01:01:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)='1', 0xf}], 0x1) [ 664.684800][T11967] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 664.714957][T11967] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 664.750309][T11967] EXT4-fs (loop1): failed to open journal device unknown-block(0,0): -6 01:01:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0xc, 0xfa00, {&(0x7f0000000040), r2, 0x2}}, 0x18) mlockall(0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d00)=ANY=[@ANYBLOB="28000000415a4373dfdcc24eccc7fde58400fa89019b2e082ee80932614efc14b2da6a50cb0bf9714a00a97594099ee88f9fbdab6c5334b262a724706d88aa6f3fd66edf7e0f159895afb2c932df0b2f262057bfd796e52eab381d2cdc0b4509ac6abfa808297b0bd6f5a080c15177e3ffa9462b9145c92b0e8407d24f87123b34ff44cf2a451db7a0b78a004862b7cb3d", @ANYRES16=r6, @ANYBLOB="010a000000000000000002000000140001000400010069623a697036746e6c300000"], 0x28}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000a40)=0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000a80)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000540)=0x1d0) r9 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000580), 0x0, 0x1ff) fstat(r9, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r10) r11 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r11, &(0x7f00000017c0), 0x33d, 0x0) ioctl$TIOCGSID(r11, 0x5429, &(0x7f0000000bc0)=0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r13, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0}, &(0x7f0000000c40)=0xc) r15 = getegid() sendmsg$unix(r4, &(0x7f0000000cc0)={&(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000680)="587b461279cd23d061a47f62913c27c2a7e4b8c1ea9d5c9b3972ae14500204244d6cdf48e163eba33e4e94bb2fcba8fabfadaead360fb0b9803e2944eecfa0ae29df22f24cfb04118613fad0eae507d44d5b5b67903a668404e17b3f825e56f9076d28f426b3134f959be16a6fc7cc5b5c111c39c1a2c1530aad4e455796d51b46c1b7079332689071d9935057ba898e", 0x90}, {&(0x7f0000000500)="d51d3b561b36", 0x6}, {&(0x7f0000000740)="e32c03bd845dfb399984449fbe8f59d2b693a68a3d3ddcc17dcba5cef66650", 0x1f}, {&(0x7f0000000780)="f6d40bf7ffbb7867cf318fa73e748ee203e3aa1b92ca1b8211d9420480eb498c4bbf36a2", 0x24}, {&(0x7f00000007c0)}, {&(0x7f0000000800)}, {&(0x7f0000000840)="77422744f4482e1cd14a8a346334fa3f8712e5bd361be683630de02aa75618006e5dd77b962ad5c68f0425a0bad7c5", 0x2f}, {&(0x7f0000000880)="e9face25bb", 0x5}, {&(0x7f00000008c0)="7112c2ed99afb6abcebaa8223564b74f500f559f1d992cbe625c1a09596d86dd0473c82c48410dd579bf2fe65d748849629cd7c192f28d92b42191b37e32469b141109d9335e97a5e056ed05353a2c015b84f36e982fc45bfc9ee800db75f57418b08b3807fc2a735f821bff67577077e57650271f11fce1f32b38335ecffe5a33ad068524089b559f25defba95a32ef6eedae565cf3d34bf237571e99b21d1cc13f84abb8b5", 0xa6}], 0x9, &(0x7f0000000c80)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r10}}}, @cred={{0x1c, 0x1, 0x2, {r12, r14, r15}}}], 0x40, 0x20000802}, 0x20080) sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x9200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x108, r6, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffff9}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa47}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5a7e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb585}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x8004}, 0x100) preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000000)) 01:01:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) [ 664.939442][T11984] syz-executor.5 (11984): /proc/11983/oom_adj is deprecated, please use /proc/11983/oom_score_adj instead. 01:01:32 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:32 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', r2}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x1, r3}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 01:01:32 executing program 5: 01:01:32 executing program 4: 01:01:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:33 executing program 5: 01:01:33 executing program 4: 01:01:33 executing program 5: 01:01:33 executing program 1: 01:01:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) mlockall(0x1) 01:01:33 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 01:01:33 executing program 4: 01:01:33 executing program 1: 01:01:33 executing program 5: 01:01:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:34 executing program 4: 01:01:34 executing program 5: 01:01:34 executing program 1: 01:01:34 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:34 executing program 4: 01:01:34 executing program 5: 01:01:34 executing program 3: 01:01:34 executing program 1: 01:01:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:34 executing program 4: 01:01:34 executing program 5: 01:01:35 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = getpgrp(r0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f0000000840)=[{&(0x7f0000000980)=""/91, 0xffffffffffffff6e}], 0x25e, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB="0000ba9d482b"], &(0x7f00000000c0)=0xa) mlockall(0x8) 01:01:35 executing program 5: 01:01:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:35 executing program 1: 01:01:35 executing program 3: 01:01:35 executing program 4: 01:01:35 executing program 2: mlockall(0x8) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x02', 0x400, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000040)={0x14, 0x49, 0x2, {0x70, 0x3, 0x3}}, 0x14) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x36800, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r1, 0x4) 01:01:35 executing program 5: 01:01:35 executing program 3: 01:01:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7c}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 01:01:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) read(r0, &(0x7f0000000200)=""/231, 0x100000330) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 01:01:35 executing program 2: mlockall(0x8) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) 01:01:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) 01:01:35 executing program 3: mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x620220, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 668.125586][ T25] audit: type=1326 audit(1572483695.895:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12097 comm="syz-executor.2" exe="/root/syz-executor.2" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 01:01:36 executing program 4: 01:01:36 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 668.246140][T12107] bridge0: port 2(bridge_slave_1) entered disabled state [ 668.253351][T12107] bridge0: port 1(bridge_slave_0) entered disabled state 01:01:36 executing program 3: mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x620220, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 01:01:36 executing program 1: 01:01:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xbe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:01:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\t\x00\x00\x00\x00\x00\x00\x00\x86\x92U\xb5\xb7>\xbe\xed\xd9\xd1\xce\xffP\xe4\xf9\x00J\xf48K\xf9j\x95\xe13') fstat(r0, &(0x7f0000000480)) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 01:01:36 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00a\x00'}) 01:01:36 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') getpid() sched_setscheduler(0x0, 0x5, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='setgroups\x00') socket$inet6(0xa, 0x1000000000002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001cc0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 01:01:36 executing program 2: mlockall(0x8) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000540)={0xffffffff, 0x8000, 0xac, 0x61, 0x7f}, 0x14) vmsplice(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="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", 0xfb}, {&(0x7f0000000180)="e10930c9b166b80ed23b9d9301f5eacbc780d425af11a2fde82a4977aac0edd317e4270e3b76d35f81308d2dedc0845f00f11e65d850166a9bab26f6f1398d98dfe01e7ccafc0b16552005764e2277a2d029cb0f40abc193aa109429104b97abe98d989c20cbad00d27ce6533bcace7ffb4cebdd258008f095b37f7b9f91493acc8e0d803e48c264e9afc3894c33", 0x8e}, {&(0x7f0000000240)="79a366ce6a86d2512b913797804698bea526c6cd46fd32dcde00ec88665d6a40ead78934a28423fcccc864f3", 0x2c}, {&(0x7f0000000280)="152d318a14a78d1f5f6360cae1347adbfa0ec5de614f8c95305d6337f0bcaee456ac34d6faa2b042c29b5a2f0fd2a6e6164da22c48b4ecc119e7966a2bf2825cd47bbc6613b7a8a22d9b3f1304acd8b59e8beb7aff32d98f5de353df85535685013eceaf35112379221df6aca008539c7c8f16f7d15631cdfda251716d", 0x7d}, {&(0x7f0000000300)="98ea0e37e1653e2d4c80c0b8baec462ee2b47b1a7c7a0602635523b8748631519ebe91d61a6c4dd74a61ea1ce8ee7c3a5bc02f08d53bd9cd2aa673f27b4a068c9d58067539bc2fe8d358dffc63f61e8385c6c26c925f83681b9c8ae65105e30940b9e4aeddb6809e760457462034bcb3e8d65b9386c72f690f7b", 0x7a}, {&(0x7f0000000380)="51630c4b7e3bb99b2d39106411fd14ee8254380d761795fc021a102cbf9699f0ff649f9021419c6dc5be8352e4656c221224a457ccbcebc12116f975caa36d930ea21b9bd943b012424259220215c2cc5ab2a70b235fb63e43b71cd25885e42b1d7c2894f606c2e713154d3d5e9cdba834c800a82ab816b60fe071ada83e8523bdad224964614968a8d7e62fb4ca637814aa71af3673831fe65d56fe714d1fbb057b2838127e2c803588d93d01e924ae5f52f9d273e441e8bc6a350193d995ddd5c2941f82ce6a7fa89b5afeb8d361b300aa067dbbbddec65026cb94", 0xdc}], 0x6, 0x8) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1) 01:01:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000100)=""/139, &(0x7f0000000080)=0x8b) 01:01:36 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:36 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f0000000380)='./file0\x00') fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) 01:01:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@lsrr={0x83, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 01:01:37 executing program 3: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) ptrace(0x11, r0) 01:01:37 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 01:01:37 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20001, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)=0x9) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000000c0)) mlockall(0x8) [ 669.672912][ T25] audit: type=1326 audit(1572483697.435:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12165 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 01:01:37 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000300)="130000001400072da46b1ec8dd421200100001", 0x13) 01:01:37 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:37 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000009031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='cmdline\x00\x19\v\xfcN?[\xb4q\x00cB{\x92\xd02\xdct\xc8\xcd\x1f\xb6\x18\xd8q1\t\xc8_\xbb\xc0\x04\xbe/\xf7|\xec7\x894\xb8\xb7\x17\xc5\x9e\xecX\xdf0\x98\xe6m\xad\xaa\xb1\x14X\xd0(\xcf\xac\xaf`mu\xdfc\xb46\x14\x12\x83\x1a=\x9c\x03\t\bN\xd8\x1b\xac>\x14+\xc0\x9cp!j]\xdcl') mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x100000003) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1) 01:01:37 executing program 2: 01:01:37 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) mq_open(&(0x7f0000000040)=':\x00', 0x0, 0x0, 0x0) 01:01:37 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:37 executing program 2: mlockall(0x8) socket$bt_cmtp(0x1f, 0x3, 0x5) 01:01:38 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 670.273662][ T25] audit: type=1326 audit(1572483698.035:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12194 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 01:01:38 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RAUTH(r1, 0x0, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r2, &(0x7f0000000080)=@hat={'permhat ', 0x0, 0x5e, ['/p\t\x00\x00\x00\x00\x00\x00\x00ad-sel(rcurrent\x00\x00\x00\x00\x00\x00', '{lo\x00', '-vboxnet0\x00', '\x00', '\x00', '\x00']}, 0x15) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 01:01:38 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) 01:01:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) 01:01:38 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:38 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000000)) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x24) 01:01:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) poll(&(0x7f0000000000)=[{r1}], 0x1, 0xfffff55e) [ 670.569376][T12209] AppArmor: change_hat: Invalid input '0x00000000000' [ 670.753402][ T25] audit: type=1326 audit(1572483698.515:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12218 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 [ 671.060113][ T25] audit: type=1326 audit(1572483698.825:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12194 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0xffff0000 01:01:39 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x30000011}) 01:01:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:39 executing program 2: mlockall(0x0) 01:01:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000100)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r1, 0x1, 0x6, @remote}, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) connect$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x5, 0x6, @remote}, 0x14) socketpair(0x9, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r4, &(0x7f0000000800)="129db48c478df895c774f90ecaf40467b77b8ee11d473ef4c300de2fef13d0fb60fb3307a118ec82b12ba8", 0x2b, 0x2000000, &(0x7f0000000840)={0x11, 0x4, 0x0, 0x1, 0xbe, 0x6, @remote}, 0x14) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000c00)={0xffffffffffffffff}) ioctl$IMCTRLREQ(r6, 0x80044945, &(0x7f0000000c40)={0x4004, 0x400, 0x7fff}) r7 = socket(0x1, 0x3, 0x8) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r7, 0x114, 0xa, &(0x7f00000011c0)={0x3, "f2eff6"}, 0x4) write$cgroup_int(0xffffffffffffffff, &(0x7f0000001200)=0x2, 0x12) accept4(0xffffffffffffffff, 0x0, &(0x7f0000002800), 0x80000) syz_genetlink_get_family_id$tipc(&(0x7f0000002880)='TIPC\x00') bind$pptp(0xffffffffffffffff, &(0x7f0000002a40)={0x18, 0x2, {0x0, @remote}}, 0x1e) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) r8 = accept(r7, &(0x7f0000005cc0)=@nfc, &(0x7f0000005d40)=0x80) bind$xdp(0xffffffffffffffff, &(0x7f0000005d80)={0x2c, 0x5, 0x0, 0x33, r8}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000005e80)) r9 = socket(0x0, 0x5, 0x3f) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000007c80)={0x0, 0x8a, "691bfc793b134afd71a3e4eea731fa8688d696febef2787b116f64633a66dd6dd216a4c810b7fe5e78c1b1028c3c59907d3ac585b00f707448bb0b47568892be3f6280bf91782930f175e3b3bf51f3af44ee5b699ebf007010ca61e2be1a613b1f77db87b257ce5dcea5a1bd21ef05428cb9b5b6490b746d4e2d44259d9b329d50f816acb2d679cf42ed"}, &(0x7f0000007d80)=0x92) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f0000007dc0)={r10, @in, 0x5, 0x100}, 0x90) 01:01:39 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000001380)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001400)=""/103, 0x67}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f8, &(0x7f0000000140)='sit0\x00') 01:01:39 executing program 4: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x5) 01:01:39 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) r0 = eventfd(0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/624], 0x2bd) 01:01:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:39 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r1) [ 671.902962][ T25] audit: type=1326 audit(1572483699.645:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12253 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 01:01:39 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x30}, 0x1, 0x6c}, 0x0) 01:01:39 executing program 2: r0 = msgget$private(0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x800, 0x0) write$rfkill(r1, &(0x7f0000000180)={0xfffffe87, 0x6, 0x2, 0x0, 0x1}, 0x8) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0xffffffffffffffff, 0xee00}}) msgctl$IPC_RMID(r0, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:hald_cache_t:s0\x00', 0x22, 0x3) mlockall(0x8) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x0, 0x2, 0x200, 0x6}}, 0x30) 01:01:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2001, 0x0) 01:01:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 672.088215][T12268] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 672.096648][T12268] netlink: 'syz-executor.3': attribute type 6 has an invalid length. [ 672.107090][T12269] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 672.115281][T12269] netlink: 'syz-executor.3': attribute type 6 has an invalid length. 01:01:40 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000180)='./file0\x00', 0x200c2, 0xffffffffffffff8d) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x14) 01:01:40 executing program 3: socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000180)) write(0xffffffffffffffff, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) pselect6(0x40, &(0x7f00000000c0)={0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) 01:01:40 executing program 2: mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/128, 0x80}, {&(0x7f0000001100)=""/78, 0x4e}, {&(0x7f0000001240)=""/121, 0x3ed}], 0x4, 0xfffffffffffffffd) ioctl$KDADDIO(r0, 0x4b34, 0x3) 01:01:40 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0x7, 0x0, 0x0) [ 672.524878][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 672.530723][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 672.658991][ T25] audit: type=1326 audit(1572483700.425:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12253 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x0 01:01:40 executing program 5: 01:01:40 executing program 1: 01:01:40 executing program 4: 01:01:40 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x4a75d38118e73bc2) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) mlockall(0x8) 01:01:40 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) [ 672.934887][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 672.940698][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 672.946868][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 672.952616][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:40 executing program 2: mlockall(0xc) [ 673.014892][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 673.020712][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:40 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x86000) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f00000004c0)=ANY=[]) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) prctl$PR_SET_PDEATHSIG(0x1, 0x34) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:01:40 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}]}, 0x30}, 0x1, 0x6c}, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) open(0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 673.323850][T12325] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 673.375380][T12325] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 01:01:41 executing program 3: 01:01:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r1) 01:01:41 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:41 executing program 2: mlockall(0x6) 01:01:41 executing program 1: 01:01:41 executing program 5: 01:01:41 executing program 2: mlockall(0x8) socket$inet6_tcp(0xa, 0x1, 0x0) 01:01:41 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:41 executing program 1: 01:01:41 executing program 3: 01:01:41 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x86000) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f00000004c0)=ANY=[]) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) prctl$PR_SET_PDEATHSIG(0x1, 0x34) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:01:41 executing program 5: 01:01:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20000, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r3, &(0x7f00000017c0), 0x33d, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r4, &(0x7f00000017c0), 0x33d, 0x0) r5 = fcntl$getown(r4, 0x9) r6 = syz_open_procfs(r5, &(0x7f0000000140)='net/fib_trie\x00') preadv(r6, &(0x7f00000017c0), 0x33d, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES64=r0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESHEX=r3, @ANYRESOCT, @ANYRES64=r6], @ANYBLOB="0aaae48ea4531522d45a34e8e508a195fcdbd0418d5cf3b451ef2f1c4d018c14780c5466106b29353d9dc605893ffa2e197f87dbcfc504a6d7fa3072a6f06003673e90105efaeefc575a2451eb41cd9f5b6657cb74f2fde3c1328878187944b55ac404840894a5b4aa78af7649dd7325f99db3ddbcf2961a0ae63a1e24e93cdd98827519858e704b4dd552b1fc21f023f2f11079d19fc8cfa755443879f07813be5f545b7b2d92937e9ad3add69228ef6a8c70885a596e77ae514ce81e40c9712a40b0762724c9a26b284a0c3e12c9b7213867cce752f1acdbc5c69983641ca832fc16af3169215a88f12596d1b7ad53767b2b"]], 0x8) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x200, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0xffffffffffffffac, 0x11, 0x81}}, ["", "", "", "", ""]}, 0x30a}, 0x1, 0x0, 0x0, 0x40}, 0x4049) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc100565c, &(0x7f0000000180)={0x0, 0x0, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x5, 0x1, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r6, 0x0) unshare(0x40000000) mlockall(0x8) 01:01:41 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x86000) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f00000004c0)=ANY=[]) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) prctl$PR_SET_PDEATHSIG(0x1, 0x34) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:01:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:42 executing program 5: 01:01:42 executing program 3: [ 674.466380][T12363] IPVS: ftp: loaded support on port[0] = 21 01:01:42 executing program 3: 01:01:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:42 executing program 5: 01:01:42 executing program 4: [ 674.891369][T12367] IPVS: ftp: loaded support on port[0] = 21 01:01:42 executing program 1: 01:01:42 executing program 5: 01:01:42 executing program 3: 01:01:43 executing program 2: mlockall(0x7) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 01:01:43 executing program 4: 01:01:43 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000200)={0x90}, 0x90) 01:01:43 executing program 5: 01:01:43 executing program 3: 01:01:43 executing program 4: 01:01:43 executing program 5: 01:01:43 executing program 4: 01:01:43 executing program 3: 01:01:43 executing program 1: 01:01:43 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:43 executing program 4: 01:01:43 executing program 5: 01:01:43 executing program 3: 01:01:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) mlockall(0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') preadv(r2, &(0x7f00000017c0), 0x33d, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000180)) preadv(r1, &(0x7f00000017c0), 0x33d, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)=""/225) 01:01:44 executing program 4: 01:01:44 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:44 executing program 3: 01:01:44 executing program 5: 01:01:44 executing program 1: 01:01:44 executing program 4: 01:01:44 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000200)={0x90}, 0x90) 01:01:44 executing program 2: setrlimit(0x2, &(0x7f0000000000)={0x3, 0x8000000}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x20986900, 0x0, 0x0, 0x0, &(0x7f0000000080)="03846bd5527d92719207005fa8b2d94c22") 01:01:44 executing program 3: mkdir(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioprio_set$uid(0x3, 0x0, 0x3ff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000de00"], 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 01:01:44 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) utime(&(0x7f00000000c0)='./file0\x00', 0x0) 01:01:44 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 01:01:44 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x9}, 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240), 0x8) 01:01:44 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, 0x0, 0x0) 01:01:44 executing program 1: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x7fff, 0x1000}], 0x1, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) 01:01:45 executing program 3: ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x6540, 0x0) close(0xffffffffffffffff) 01:01:45 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, 0x0, 0x0) 01:01:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x100000006, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)) 01:01:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) r0 = socket$kcm(0xa, 0x100000006, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)={r1}) 01:01:45 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00\xd4\xf9\x00\x00\x00\x00\x00\x00\xac0\xd8\xe5\x00', 0xf00}) 01:01:45 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(0xffffffffffffffff, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r1, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:01:45 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_ENTRY(r0, 0x0, 0x0) 01:01:45 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 01:01:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000000)) [ 678.248857][ T25] audit: type=1804 audit(1572483706.015:102): pid=12495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/245/file0" dev="sda1" ino=16617 res=1 01:01:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 678.449898][ T25] audit: type=1804 audit(1572483706.045:103): pid=12495 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/245/file0" dev="sda1" ino=16617 res=1 01:01:46 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(0xffffffffffffffff, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r1, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:01:46 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(0xffffffffffffffff, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r1, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 678.559995][ T25] audit: type=1804 audit(1572483706.065:104): pid=12502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/245/file0" dev="sda1" ino=16617 res=1 01:01:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x0, 0x0}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'\x00\xd4\xf9\x00\x00\x00\x00\x00\x00\xac0\xd8\xe5\x00', 0xf00}) 01:01:46 executing program 3: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(0xffffffffffffffff, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r1, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, 0x0, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:01:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff69}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x27, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4000, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) r3 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x110) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(r3, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/188, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace(0x4206, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) pipe2$9p(&(0x7f0000000040), 0x82800) [ 678.822997][ T25] audit: type=1804 audit(1572483706.585:105): pid=12517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/246/file0" dev="sda1" ino=16490 res=1 01:01:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 679.005927][ T25] audit: type=1804 audit(1572483706.765:106): pid=12520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir992337105/syzkaller.tkrGbx/96/file0" dev="sda1" ino=16618 res=1 01:01:46 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x8002, &(0x7f00000000c0)=0x90d5, 0x43) io_setup(0x8001, &(0x7f0000000040)) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) creat(&(0x7f0000000040)='./file0\x00', 0x88) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000010010006", @ANYBLOB="04000d000000000008", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYBLOB="10000400000000002000000000000000"], 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 01:01:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0x0, 0x3, 0x0, 0x0, 0xfffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff69}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4000, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) r4 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x110) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x100000000, 0x101, 0x0, 0x4, 0x15, 0x4, "25127fa9d69e0cbfa5d31b9d7142c676ef3733616defcdf76dc49e752ab5dd1bde72e9796737090435eb0502d727b733a85431dcedd324f4a24cbc03cb5927b5", "2827018425266962d4dea6325465d1504718d2567063606de54d4a0ddd92f8125a1ef0607410b788b24f3ea4a30c106694ce4ddcb325070b99d88c629d7bac0c", "083c444fd7e1b3fa4e20dae1435652cfea4df28754e60488ffa027838c6a76d5", [0x2, 0x4]}) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) signalfd4(r4, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/188, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace(0x4206, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) pipe2$9p(&(0x7f0000000040), 0x82800) [ 679.288426][ T25] audit: type=1804 audit(1572483707.055:107): pid=12526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir465904200/syzkaller.sALGFc/193/file0" dev="sda1" ino=17314 res=1 01:01:47 executing program 2: add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) creat(0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x0, 0x1, [{}]}) 01:01:47 executing program 3: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xe) r2 = syz_open_procfs(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff0180eaff07003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3da7a70878abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b001535496baefa4a0000000000000000000000a7c95633ff99a444abb4602be5ed405a7d5aeec770b23e656e7c"], 0xa1) r3 = dup(0xffffffffffffffff) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18, 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) r4 = syz_genetlink_get_family_id$nbd(0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000001000017b6d080000000000000000007293", @ANYRES32=0x0, @ANYBLOB="00a224d61bd2000008001b00000000000c002b0008000300273aff"], 0x3}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=r4, @ANYBLOB="050c2700000071b3967c00000000"], 0x2}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000040}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000528bd7000fbdbdf250300000008000100000000000c000800ffffff7f000000000c00040002000000000000000c0006000100000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000140), 0x1, 0x0, 0x0, 0x2004000}, 0x20000840) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) pipe2$9p(&(0x7f0000000240), 0x0) sendmsg$sock(r1, 0x0, 0x4040004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) 01:01:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:47 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000380)=@ethtool_coalesce={0xe}}) 01:01:47 executing program 2: add_key$keyring(0x0, &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x0) ftruncate(r1, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) creat(0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000240)={0x0, 0x5, 0x0, 0x0, 0x1, [{}]}) 01:01:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0x0, 0x3, 0x0, 0x0, 0xfffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff69}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4000, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) r4 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x110) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x100000000, 0x101, 0x0, 0x4, 0x15, 0x4, "25127fa9d69e0cbfa5d31b9d7142c676ef3733616defcdf76dc49e752ab5dd1bde72e9796737090435eb0502d727b733a85431dcedd324f4a24cbc03cb5927b5", "2827018425266962d4dea6325465d1504718d2567063606de54d4a0ddd92f8125a1ef0607410b788b24f3ea4a30c106694ce4ddcb325070b99d88c629d7bac0c", "083c444fd7e1b3fa4e20dae1435652cfea4df28754e60488ffa027838c6a76d5", [0x2, 0x4]}) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) signalfd4(r4, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/188, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace(0x4206, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) pipe2$9p(&(0x7f0000000040), 0x82800) 01:01:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100050, 0x0, 0x0, 0x9b}, {0x80000006}]}, 0x10) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) remap_file_pages(&(0x7f0000432000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) dup(0xffffffffffffffff) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000480)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x9cX7\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\xad\xcb\x859\xca\x1d*e7\f=v \xb6\x990:\xa4\xc2R|\xb9ZOYf\r3\x8e\x01\xa3gl\x1b=\xde\xd9\xc4K\x00\xd6\x12\xd6\x17\xaf\x1f\x98\xd8\xab4V\xb4\xbb\x8b\x95o\xdd\xd8\x1b\t@A\xc4\xc5\xfc\xdeZc\xefK\xf9\xcb\xa0\xf8+\xd1\x99[\xfb\xd1/\x8e\xf1\xd4\xe0NzX\x1c\xc9\xd3\xbb\xd1\x86\xd9\aS\x10~\xf1\xe5@I\xc5\xf7\x86\xa4', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r3, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2003, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000040)={0x0, 0x23, 0x0, 0x14, 0x0, 0xffffff48, 0x3}) ftruncate(r1, 0x2007fff) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x200000000b, 0x0) 01:01:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 01:01:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x31, 0x0, &(0x7f0000000080)=0xffffffffffffffc5) [ 680.203477][T12585] mmap: syz-executor.4 (12585) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 01:01:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9, 0x0, 0x3, 0x0, 0x0, 0xfffffffd, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff69}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x4000, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) r4 = perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./file0\x00', 0x420000, 0x110) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x100000000, 0x101, 0x0, 0x4, 0x15, 0x4, "25127fa9d69e0cbfa5d31b9d7142c676ef3733616defcdf76dc49e752ab5dd1bde72e9796737090435eb0502d727b733a85431dcedd324f4a24cbc03cb5927b5", "2827018425266962d4dea6325465d1504718d2567063606de54d4a0ddd92f8125a1ef0607410b788b24f3ea4a30c106694ce4ddcb325070b99d88c629d7bac0c", "083c444fd7e1b3fa4e20dae1435652cfea4df28754e60488ffa027838c6a76d5", [0x2, 0x4]}) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) signalfd4(r4, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/188, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace(0x4206, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x1) pipe2$9p(&(0x7f0000000040), 0x82800) 01:01:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x10000000004e21, @empty}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x200001000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @multicast1}, @udp={0x2, 0x4e21, 0x8}}}}}, 0x0) 01:01:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 01:01:48 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x4001000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") syz_emit_ethernet(0x77, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0xa}}}}}, 0x0) [ 680.546981][ T25] audit: type=1800 audit(1572483708.315:108): pid=12591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16651 res=0 01:01:48 executing program 3: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xe) r2 = syz_open_procfs(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff0180eaff07003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3da7a70878abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b001535496baefa4a0000000000000000000000a7c95633ff99a444abb4602be5ed405a7d5aeec770b23e656e7c"], 0xa1) r3 = dup(0xffffffffffffffff) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18, 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) r4 = syz_genetlink_get_family_id$nbd(0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="340000001000017b6d080000000000000000007293", @ANYRES32=0x0, @ANYBLOB="00a224d61bd2000008001b00000000000c002b0008000300273aff"], 0x3}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=r4, @ANYBLOB="050c2700000071b3967c00000000"], 0x2}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000040}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYBLOB="000528bd7000fbdbdf250300000008000100000000000c000800ffffff7f000000000c00040002000000000000000c0006000100000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000140), 0x1, 0x0, 0x0, 0x2004000}, 0x20000840) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) pipe2$9p(&(0x7f0000000240), 0x0) sendmsg$sock(r1, 0x0, 0x4040004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) 01:01:48 executing program 4: syz_emit_ethernet(0x1a, &(0x7f0000000000)={@link_local, @random="8c1b1069f01c", [{[], {0x8100, 0x0, 0x1}}], {@llc={0x4, {@snap={0x0, 0x0, '`', "1819ff"}}}}}, 0x0) 01:01:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 01:01:48 executing program 2: 01:01:48 executing program 0: 01:01:48 executing program 5: 01:01:48 executing program 4: 01:01:49 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:01:49 executing program 2: 01:01:49 executing program 0: 01:01:49 executing program 4: 01:01:49 executing program 5: 01:01:49 executing program 3: 01:01:49 executing program 2: 01:01:49 executing program 0: 01:01:49 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:01:49 executing program 5: 01:01:49 executing program 4: 01:01:49 executing program 2: 01:01:49 executing program 0: 01:01:50 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:01:50 executing program 5: 01:01:50 executing program 3: 01:01:50 executing program 4: 01:01:50 executing program 2: 01:01:50 executing program 0: 01:01:50 executing program 5: 01:01:50 executing program 3: 01:01:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:50 executing program 4: 01:01:50 executing program 2: 01:01:50 executing program 0: 01:01:50 executing program 3: 01:01:50 executing program 5: 01:01:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:50 executing program 4: 01:01:51 executing program 0: 01:01:51 executing program 2: 01:01:51 executing program 3: 01:01:51 executing program 4: 01:01:51 executing program 5: 01:01:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:51 executing program 0: 01:01:51 executing program 2: 01:01:51 executing program 3: 01:01:51 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x100000000000001, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x1, 0x0) connect(r5, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x86) 01:01:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000240), 0x4) 01:01:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6f}}, &(0x7f0000003ff6)='OPL\x00', 0x8500, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:01:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 01:01:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc02c5341, &(0x7f0000000000)) 01:01:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:52 executing program 4: 01:01:52 executing program 5: write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "2f4e5fd817b93853", "43e02f20d6537abd439fdaa1794596dcd5e0873381ceba1d92f6d6a575081754", "8598652b", "6f66393cf504a09e"}, 0x38) 01:01:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 01:01:52 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x103}, 0x10) sendmmsg$alg(r1, &(0x7f0000002b00)=[{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000000180)="99", 0x1}], 0x1}], 0x1, 0x0) 01:01:52 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="5300000044a6aeabec2e1520000000000000001000fff64017db982000000000fab53b08d403ffff633b27e50a5d0da20a9683768c995e9aa14417e3e00c8701fc30bcfaf2c9fa92714be85dd106736d17c3f2c876d69925da"], 0x58) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x1, 0x3}}, 0x14) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000002580)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "2f4e5fd817b93853", "43e02f20d6537abd439fdaa1794596dcd5e0873381ceba1d92f6d6a575081754", "8598652b", "6f66393cf504a09e"}, 0x38) 01:01:52 executing program 4: r0 = memfd_create(&(0x7f0000000140)='$B6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x3c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = gettid() tkill(r3, 0x10010000000032) 01:01:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 684.752171][ C0] sd 0:0:1:0: [sg0] tag#426 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 684.761594][ C0] sd 0:0:1:0: [sg0] tag#426 CDB: Test Unit Ready [ 684.767988][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.777521][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.787046][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.796597][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.806131][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.815661][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.825164][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.834646][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.844169][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.853692][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.863230][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.873103][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.882709][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 684.892258][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01:01:52 executing program 5: write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "2f4e5fd817b93853", "43e02f20d6537abd439fdaa1794596dcd5e0873381ceba1d92f6d6a575081754", "8598652b", "6f66393cf504a09e"}, 0x38) [ 684.901873][ C0] sd 0:0:1:0: [sg0] tag#426 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 01:01:52 executing program 0: write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "2f4e5fd817b93853", "43e02f20d6537abd439fdaa1794596dcd5e0873381ceba1d92f6d6a575081754", "8598652b", "6f66393cf504a09e"}, 0x38) 01:01:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="a48b12f728db4f2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e20000007c0e3ca8adbf7e4a2d74a75d00008489ef41b4ef4a6566a55fd4caa8d6c0dee265ea2121b173c73f15984fdd5bd24e99b71a8d7f2c45641455ffc3001e29106fa8cd40e6b02b7dcd2809fe1e135ab17b1fbdf7c2a5fae9acc79f793d07a3a4c1e6544bb07d9d1438733ca9997fb677a0b480f808e1251c0fbac0790ad0cf944599b4b23297e30e613b957bbd04", 0xbb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 685.025840][T12763] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.4 proc:/self/fd/3' not defined. 01:01:52 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) accept4(r3, 0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 01:01:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x10}, [@ldst]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 01:01:53 executing program 5: pipe(0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB='filter\x00\x00\x00\x00'], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) syz_open_procfs(0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 01:01:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 01:01:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, &(0x7f0000000100)='keyring\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0xf7, 0x6, 0x5, 0x0, 0x0, 0x40, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1000, 0xb4dc, 0x20, 0x9, 0x9, 0x1, 0x2}, 0x0, 0x3, r1, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) 01:01:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 685.449417][T12788] IPVS: ftp: loaded support on port[0] = 21 01:01:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair(0x11, 0xa, 0x0, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") 01:01:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:53 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @mss, @mss, @timestamp, @timestamp], 0x21be) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="d0ae038d17e2cf17e933357ef95ed173dd86bc6bba00776b72f9ec77d8b531b8a81f18af6915c196b71356ae801f92425e01eb729a8553afa967d2d81a7c854a3d6ff5ea4fc6be363f50e5b50e480d775896ef76f675d15dbdf6d00cc261e0e9bae597300a6812d1a39a8b758f756ee5ea6cf160d372524c06df594685c294d889bf59cb848fe704726b9cd5f8d7a51c063d594c289ce84daa1380e7dd05793332e190ab73a79f177f5404a9", 0xac}, {&(0x7f0000000240)="7bf2f1f68c1d15478e46f7d462f22ffb3986bdb8ee970bf16ac37af5e48cbe5e7aad68b4bd1cb381741d3b9d86589dad92f9023eae165d0bf0d708727c6fd0f4671081b20ed1b6e4389547059f617b0524595666ca8b2f16e286c0fb446199d913a808b6a484aa2ae4e06a98ead53a4567581f0b8650dd1740d211945be2fd9eb61ac87f3fadba920e90310e6149c1ff1b103d6d305771d6ec33ecf054d11d2ad5eb5586e641300210bebce70f5edd9bed103c05ab71a227ce49801658", 0xbd}], 0x2}, 0x0) 01:01:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, &(0x7f0000000100)='keyring\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0xf7, 0x6, 0x5, 0x0, 0x0, 0x40, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1000, 0xb4dc, 0x20, 0x9, 0x9, 0x1, 0x2}, 0x0, 0x3, r1, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) 01:01:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 686.204920][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 686.210736][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 686.364925][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 686.370778][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, &(0x7f0000000100)='keyring\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0xf7, 0x6, 0x5, 0x0, 0x0, 0x40, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1000, 0xb4dc, 0x20, 0x9, 0x9, 0x1, 0x2}, 0x0, 0x3, r1, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) 01:01:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @mss, @mss, @timestamp, @timestamp], 0x21be) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="d0ae038d17e2cf17e933357ef95ed173dd86bc6bba00776b72f9ec77d8b531b8a81f18af6915c196b71356ae801f92425e01eb729a8553afa967d2d81a7c854a3d6ff5ea4fc6be363f50e5b50e480d775896ef76f675d15dbdf6d00cc261e0e9bae597300a6812d1a39a8b758f756ee5ea6cf160d372524c06df594685c294d889bf59cb848fe704726b9cd5f8d7a51c063d594c289ce84daa1380e7dd05793332e190ab73a79f177f5404a9", 0xac}, {&(0x7f0000000240)="7bf2f1f68c1d15478e46f7d462f22ffb3986bdb8ee970bf16ac37af5e48cbe5e7aad68b4bd1cb381741d3b9d86589dad92f9023eae165d0bf0d708727c6fd0f4671081b20ed1b6e4389547059f617b0524595666ca8b2f16e286c0fb446199d913a808b6a484aa2ae4e06a98ead53a4567581f0b8650dd1740d211945be2fd9eb61ac87f3fadba920e90310e6149c1ff1b103d6d305771d6ec33ecf054d11d2ad5eb5586e641300210bebce70f5edd9bed103c05ab71a227ce49801658", 0xbd}], 0x2}, 0x0) 01:01:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000000300), 0x121, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 01:01:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, &(0x7f0000000100)='keyring\x00', 0x0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0xf7, 0x6, 0x5, 0x0, 0x0, 0x40, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1000, 0xb4dc, 0x20, 0x9, 0x9, 0x1, 0x2}, 0x0, 0x3, r1, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ftruncate(0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0xedc0) 01:01:56 executing program 5: pipe(0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000a00)=ANY=[@ANYBLOB='filter\x00\x00\x00\x00'], 0x1) writev(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x0) syz_open_procfs(0x0, 0x0) mknod$loop(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) [ 688.444914][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 688.450736][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:01:56 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockopt$ax25_int(r0, 0x102, 0x0, 0x0, 0x0) 01:01:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 688.819185][T12842] IPVS: ftp: loaded support on port[0] = 21 01:01:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x26, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000a00)="d87f3307c296fa26db03f8e2d9f897348805a03f34d7ec5e6a803d2c788e3eee7a70e89510143cdcf887b2f5af61112cb2ad7a010000000000000090a4eabcff43187513534490f626651f6a2fe6b5d83d6712b222c4c2680c74fa033eaffbd50958c60e3f9ffe22aa0d139d1bb14e604d6517744bc88ad3ef9188377a9a4487fc0536471800896cf48a0ad36ad76062c3054349e1bb9a678d57388e892bd46d93bcc6a2239d2a0df6b67c6e7cc4cd68f7da1648d5d5cdd2ce78ef824fb9d60f78d1475008de46e04af5", 0xca}], 0x1}, 0x800) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x5, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYBLOB="00000000000000001567400011000000850000001e0000007b450a00ffffffff950000000000"], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[], &(0x7f0000000200)=""/138, 0x0, 0x8a}, 0x20) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x80, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4f7}, 0x0, 0x8, 0x0, 0x0, 0x40, 0x0, 0x5}, r0, 0x1, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086607, 0x20000001) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x21, 0x0, 0x0, &(0x7f0000000780)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000c00)=""/4096, 0xe0880, 0x1, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x8, 0x0, 0x200}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={0xffffffffffffffff, r4, 0xf, 0x1}, 0x10) write$cgroup_type(r2, &(0x7f00000001c0)='threaded\x00', 0x9) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x81, 0x3c, 0x2, 0x5, 0x0, 0x2, 0x10440, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x11180, 0x4, 0xfffffffd, 0x8, 0x1, 0x5fe9, 0x6}, r5, 0xd, 0xffffffffffffffff, 0x1) 01:01:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x26, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901243c9a9fd10969673f79c5087a59a31251a1d3dd251b90b5d2ba502bc1565200d9f97390663301d4d663e4221cab091aa7a7382862a4fba28a7180a662f0b349177987c90320159865cbeffb324caeb94d359518fd79e95fb4a72424d2d5776c2e639fc616cdd079933c237ede2cd6e5eb0bfad1ccb2f4c7e5484d1a0e60f499d2fe0dcf16c5f6f51082aedf3dc13e86bacdafa90966210846c85a41eb671bf8cf4d51c38051f8ef53d1de199c6c6d3f048e2c305381a7f70f27c1fa04acd3a4ba0d2c66ac345ebe0d63a9c5bb2d298d0f0770d8439464089a908c68f0241006ec915eae1766506f1a444e8ef48061687f016aa01572201f39668469e1bada8103a17bdb97b4ae729225a42e039634645a4458e031d1bbf65608a95b395271fbcbc1a20202b5200271d342f4b9"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000a00)="d87f3307c296fa26db03f8e2d9f897348805a03f34d7ec5e6a803d2c788e3eee7a70e89510143cdcf887b2f5af61112cb2ad7a010000000000000090a4eabcff43187513534490f626651f6a2fe6b5d83d6712b222c4c2680c74fa033eaffbd50958c60e3f9ffe22aa0d139d1bb14e604d6517744bc88ad3ef9188377a9a4487fc0536471800896cf48a0ad36ad76062c3054349e1bb9a678d57388e892bd46d93bcc6a2239d2a0df6b67c6e7cc4cd68f7da1648d5d5cdd2ce78ef824fb9d60f78d1475008de46e04af5", 0xca}], 0x1}, 0x800) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="18001500c906000000000000018000001812", @ANYRES32=r0, @ANYBLOB="00000000000000001567400011000000850000001e0000007b450a00ffffffff950000000000"], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x4, 0xe, 0x1}, 0x10}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[], &(0x7f0000000200)=""/138, 0x0, 0x8a}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000bc0)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x2c}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x80, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8, 0x0, 0x0, 0x40, 0x3, 0x5}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={r2, r3, 0xf, 0x1}, 0x10) write$cgroup_type(r1, &(0x7f00000001c0)='threaded\x00', 0x9) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x81, 0x3c, 0x2, 0x5, 0x0, 0x2, 0x10440, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x11180, 0x4, 0xfffffffd, 0x8, 0x1, 0x5fe9}, r4, 0x0, 0xffffffffffffffff, 0x1) 01:01:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:56 executing program 2: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ftruncate(0xffffffffffffffff, 0x0) setpriority(0x0, 0xffffffffffffffff, 0x0) [ 689.241224][T12856] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 689.313028][T12856] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 01:01:57 executing program 2: socket$unix(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) inotify_init() setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 01:01:57 executing program 0: open$dir(0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) chmod(0x0, 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmget(0x3, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) 01:01:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) 01:01:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) 01:01:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)) socket(0x10, 0x80002, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, 0x0, 0x0) 01:01:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 01:01:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 01:01:59 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000040)=""/99, &(0x7f00000000c0)=0x63) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000004e40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='vetp0_to_team\x00', 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000003c0)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae84, 0x3, @perf_bp={0x0, 0x954ee58a73a2588b}, 0x108, 0x5, 0x5d0, 0x7, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x0, @loopback, 0xffff}}}, 0xff22) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, 0x0, 0x0) open(0x0, 0x0, 0x1) socket(0x2, 0x0, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) 01:01:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:01:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 01:01:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 01:01:59 executing program 0: 01:01:59 executing program 2: 01:02:00 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000040)=""/99, &(0x7f00000000c0)=0x63) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000004e40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='vetp0_to_team\x00', 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000003c0)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae84, 0x3, @perf_bp={0x0, 0x954ee58a73a2588b}, 0x108, 0x5, 0x5d0, 0x7, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x0, @loopback, 0xffff}}}, 0xff22) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, 0x0, 0x0) open(0x0, 0x0, 0x1) socket(0x2, 0x0, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) 01:02:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:00 executing program 2: r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000040)=""/99, &(0x7f00000000c0)=0x63) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000004e40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='vetp0_to_team\x00', 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000003c0)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae84, 0x3, @perf_bp={0x0, 0x954ee58a73a2588b}, 0x108, 0x5, 0x5d0, 0x7, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x0, @loopback, 0xffff}}}, 0xff22) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, 0x0, 0x0) open(0x0, 0x0, 0x1) socket(0x2, 0x0, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) 01:02:00 executing program 0: 01:02:00 executing program 3: 01:02:00 executing program 5: r0 = socket(0x40000000002, 0x3, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xb, &(0x7f0000000040)=""/99, &(0x7f00000000c0)=0x63) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000004e40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='vetp0_to_team\x00', 0x10) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe2(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f00000003c0)=0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xae84, 0x3, @perf_bp={0x0, 0x954ee58a73a2588b}, 0x108, 0x5, 0x5d0, 0x7, 0x0, 0x4, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000100)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x0, @loopback, 0xffff}}}, 0xff22) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, 0x0, 0x0) open(0x0, 0x0, 0x1) socket(0x2, 0x0, 0x9) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) 01:02:00 executing program 2: 01:02:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 01:02:00 executing program 0: 01:02:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:00 executing program 3: 01:02:00 executing program 2: 01:02:01 executing program 0: 01:02:01 executing program 3: 01:02:01 executing program 4: 01:02:01 executing program 2: 01:02:01 executing program 5: 01:02:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:01 executing program 0: 01:02:01 executing program 4: 01:02:01 executing program 3: 01:02:01 executing program 2: 01:02:01 executing program 0: 01:02:01 executing program 5: 01:02:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:01 executing program 4: 01:02:01 executing program 3: 01:02:02 executing program 2: 01:02:02 executing program 5: 01:02:02 executing program 0: 01:02:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:02 executing program 3: 01:02:02 executing program 4: 01:02:02 executing program 2: 01:02:02 executing program 5: 01:02:02 executing program 0: 01:02:02 executing program 3: 01:02:02 executing program 4: 01:02:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:02 executing program 5: 01:02:02 executing program 3: 01:02:02 executing program 2: 01:02:03 executing program 4: 01:02:03 executing program 0: 01:02:03 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x81050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/2, 0x2}], 0x1, &(0x7f0000000480)=[{&(0x7f0000000240)=""/198, 0xc6}], 0x1, 0x0) 01:02:03 executing program 2: 01:02:03 executing program 5: 01:02:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:03 executing program 4: 01:02:03 executing program 0: 01:02:03 executing program 2: 01:02:03 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0300fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) [ 695.947913][T13094] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 01:02:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901243c9a9fd10969673f79c5087a59a31251a1d3dd251b90b5d2ba502bc1565200d9f97390663301d4d663e4221cab091aa7a7382862a4fba28a7180a662f0b349177987c90320159865cbeffb324caeb94d359518fd79e95fb4a72424d2d5776c2e639fc616cdd079933c237ede2cd6e5eb0bfad1ccb2f4c7e5484d1a0e60f499d2fe0dcf16c5f6f51082aedf3dc13e86bacdafa90966210846c85a41eb671bf8cf4d51c38051f8ef53d1de199c6c6d3f048e2c305381a7f70f27"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000940)=@can, 0x80, &(0x7f0000002b80)=[{&(0x7f0000000a00)="d87f3307c296fa26db03f8e2d9f897348805a03f34d7ec5e6a803d2c788e3eee7a70e89510143cdcf887b2f5af61112cb2ad7a010000000000000090a4eabcff43187513534490f626651f6a2fe6b5d83d6712b222c4c2680c74fa033eaffbd50958c60e3f9ffe22aa0d139d1bb14e604d6517744bc88ad3ef9188377a9a4487fc0536471800896cf48a0ad36ad76062c3054349e1bb9a678d57388e892bd46d93bcc6a2239d2a0df6b67c6e7cc4cd68f7da1648d5d5cdd2ce78ef824fb9d60f78d1475008de46e04af5", 0xca}], 0x1}, 0x800) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="18001500c906000000000000018000001812", @ANYRES32=r0], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x4, 0xe, 0x1}, 0x10}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[], &(0x7f0000000200)=""/138, 0x0, 0x8a}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000bc0)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x2c}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086607, 0x20000001) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x21, 0x8, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x77c}]}, &(0x7f0000000780)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000c00)=""/4096, 0xe0880, 0x1, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x8, 0xfffffffe, 0x200}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={r2, r3, 0xf}, 0x10) write$cgroup_type(r1, &(0x7f00000001c0)='threaded\x00', 0x9) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x81, 0x3c, 0x2, 0x5, 0x0, 0x2, 0x10440, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x11180, 0x4, 0xfffffffd, 0x8, 0x1, 0x5fe9}, r4, 0xd, 0xffffffffffffffff, 0x1) 01:02:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 695.991106][T13094] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 696.030217][T13100] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 696.085579][T13100] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 01:02:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x7a02, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002f00815be00f80ecdb4cb90405486516100003002e000000120000140e003c001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) 01:02:04 executing program 2: r0 = socket$inet6(0xa, 0x2000000080803, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@rand_addr="001000"}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 696.324746][T13115] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 01:02:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000240)=ANY=[@ANYBLOB="280000001e000106000000000100000007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32], 0x28}}, 0x0) 01:02:04 executing program 5: r0 = socket$kcm(0x10, 0x800000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0300fa078b5bdb4cb904e473730e55cff26d1b0e001d80020000005e510befccd7", 0x2e}], 0x1}, 0x0) [ 696.400389][T13115] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 01:02:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "60799c", 0x8, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 01:02:04 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x18, &(0x7f0000000380)=ANY=[@ANYBLOB="1e00ed6c5ec5c37901243c9a9fd10969673f79c5087a59a31251a1d3dd251b90b5d2ba502bc1565200d9f97390663301d4d663e4221cab091aa7a7382862a4fba28a7180a662f0b349177987c90320159865cbeffb324caeb94d359518fd79e95fb4a72424d2d5776c2e639fc616cdd079933c237ede2cd6e5eb0bfad1ccb2f4c7e5484d1a0e60f499d2fe0dcf16c5f6f51082aedf3dc13e86bacdafa90966210846c85a41eb671bf8cf4d51c38051f8ef53d1de199c6c6d3f048e2c305381a7f70f27"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x12040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000940)=@can, 0x80, &(0x7f0000002b80)=[{&(0x7f0000000a00)="d87f3307c296fa26db03f8e2d9f897348805a03f34d7ec5e6a803d2c788e3eee7a70e89510143cdcf887b2f5af61112cb2ad7a010000000000000090a4eabcff43187513534490f626651f6a2fe6b5d83d6712b222c4c2680c74fa033eaffbd50958c60e3f9ffe22aa0d139d1bb14e604d6517744bc88ad3ef9188377a9a4487fc0536471800896cf48a0ad36ad76062c3054349e1bb9a678d57388e892bd46d93bcc6a2239d2a0df6b67c6e7cc4cd68f7da1648d5d5cdd2ce78ef824fb9d60f78d1475008de46e04af5", 0xca}], 0x1}, 0x800) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0x10000000d) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0x2, &(0x7f00000004c0)=ANY=[@ANYBLOB="18001500c906000000000000018000001812", @ANYRES32=r0], &(0x7f0000000500)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x4, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x4, 0xe, 0x1}, 0x10}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[], &(0x7f0000000200)=""/138, 0x0, 0x8a}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000bc0)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x2c}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086607, 0x20000001) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x21, 0x8, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x101}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x77c}]}, &(0x7f0000000780)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000c00)=""/4096, 0xe0880, 0x1, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x3, 0x8, 0xfffffffe, 0x200}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={r2, r3, 0xf}, 0x10) write$cgroup_type(r1, &(0x7f00000001c0)='threaded\x00', 0x9) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x81, 0x3c, 0x2, 0x5, 0x0, 0x2, 0x10440, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x11180, 0x4, 0xfffffffd, 0x8, 0x1, 0x5fe9}, r4, 0xd, 0xffffffffffffffff, 0x1) [ 696.609468][T13124] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 01:02:04 executing program 2: r0 = socket$inet6(0xa, 0x2000000080803, 0x1) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6=@rand_addr="001000"}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 696.673941][T13124] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 01:02:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 01:02:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "60799c", 0x8, 0xffffff11, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 01:02:04 executing program 5: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x100000006, 0x0) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="006d509039d74dfd478147252a7cf041d51c8404000000284e5e3e61160e7abcfa36362eed639bd2a559c2a1c28f000067377b4b7373279debfb115fe383d0949b1907a8df9f7887b437febb9c3c27292080e48f"], 0xfdef) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="006d656d6f7279202cf20800c74dfd7fff89f82a7cf041d5ffe2015112e3c87462d4678c8dc1d95a5113fdf5048b6e275f20d4a85f6461d7736937b9824504f564118b394f06f92e69c9a19b9051150208386785b7157f9d603a1d8459a3498786de691338f25cabdc55060d3a41ecbb568d2912d79e9b06d8f83163d7fa235a02a5d4047f33a5439674726b07dc7194a6adeaee1b6c22b5a9d19fb400"/166], 0xfdef) 01:02:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x190}, 0x3c) 01:02:04 executing program 4: r0 = creat(&(0x7f00000006c0)='./file1\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 01:02:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000240)=0x3f, 0x4) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000380)) 01:02:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:05 executing program 2: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r2, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, &(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x20040, 0x4) 01:02:05 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="13f80f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e892451c93db0ed05311b9e56d77397f8640cef47628488498f2c8c6624e7329e5b17f60fe94e963686a647bbcddc1417ad4f79a4d2a5e9", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38ee"], 0x0, 0x90}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:02:05 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) fcntl$dupfd(r1, 0xa0f, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) 01:02:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r2, 0xa, 0x12) recvmmsg(r3, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x16) sched_setattr(r1, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) gettid() bind$inet(0xffffffffffffffff, &(0x7f0000000200), 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, 0x0}, 0x0) [ 697.649809][T13180] ptrace attach of "/root/syz-executor.0"[13179] was attempted by "/root/syz-executor.0"[13180] 01:02:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x0, 0x0, 0x0, 0x135}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000280)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 697.712708][ T25] audit: type=1804 audit(1572483725.475:109): pid=13176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/229/file0/file0" dev="loop2" ino=33 res=1 01:02:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:05 executing program 2: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r2, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, &(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x20040, 0x4) 01:02:05 executing program 5: socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x11, 0x2, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0xa, 0x100000006, 0x0) socket$kcm(0x11, 0x3, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="006d509039d74dfd478147252a7cf041d51c8404000000284e5e3e61160e7abcfa36362eed639bd2a559c2a1c28f000067377b4b7373279debfb115fe383d0949b1907a8df9f7887b437febb9c3c27292080e48f"], 0xfdef) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="006d656d6f7279202cf20800c74dfd7fff89f82a7cf041d5ffe2015112e3c87462d4678c8dc1d95a5113fdf5048b6e275f20d4a85f6461d7736937b9824504f564118b394f06f92e69c9a19b9051150208386785b7157f9d603a1d8459a3498786de691338f25cabdc55060d3a41ecbb568d2912d79e9b06d8f83163d7fa235a02a5d4047f33a5439674726b07dc7194a6adeaee1b6c22b5a9d19fb400"/166], 0xfdef) 01:02:05 executing program 4: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) fcntl$dupfd(r1, 0xa0f, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) [ 698.048164][ T25] audit: type=1804 audit(1572483725.575:110): pid=13176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir642608830/syzkaller.NTTnVj/229/file0/file0" dev="loop2" ino=33 res=1 01:02:05 executing program 0: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0xfffffff4) fcntl$dupfd(r1, 0xa0f, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) [ 698.130809][ T25] audit: type=1800 audit(1572483725.615:111): pid=13176 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="loop2" ino=33 res=0 01:02:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:06 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r2, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, &(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x20040, 0x4) 01:02:06 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r2, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, &(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x20040, 0x4) [ 698.844877][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 698.850672][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:02:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x10}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 01:02:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000180)={@ipv4={[], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, r1}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 01:02:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000002c0)=0xece) fcntl$setsig(r2, 0xa, 0x12) recvmmsg(r3, &(0x7f0000002bc0)=[{{0x0, 0xfffffffffffffd10, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x40000fd, 0x0, 0x0) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x16) sched_setattr(r1, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0) gettid() bind$inet(0xffffffffffffffff, &(0x7f0000000200), 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, 0x0}, 0x0) 01:02:07 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8000000004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x3fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) fallocate(r1, 0xf4ffffff00000000, 0x20, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) writev(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$inet(r2, &(0x7f00000003c0)=""/221, 0xdd, 0x10000, &(0x7f0000000240)={0x2, 0x4e21, @empty}, 0x10) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="6d696200060113000000008000"}}}, 0x108) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x20040, 0x4) 01:02:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:02:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000540)='vfat.', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{0x0}], 0x0, 0x0) 01:02:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x10}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) [ 700.715062][ T25] audit: type=1804 audit(1572483728.395:112): pid=13259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir423057876/syzkaller.zY46d5/284/file0/file0" dev="loop4" ino=34 res=1 01:02:08 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0xe1002, 0x0) write$9p(r0, &(0x7f0000000040)="0600000000000000c9b9000f04000000001ff7adf576f3790f68bc2c197cbf8d63735a09ab8383afd2de1a5587fe067f00002000249e1dabddb514480a169fc72518f833b3aacfcf0ef7b0bdd78687fc006bff51b9f9218a249e3d00000000000000000000000053", 0x68) 01:02:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000140)='./file0\x00', 0x40) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000380)=[@ip_retopts={{0x10}}], 0x10}, 0x800) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:02:09 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$dri(0x0, 0x0, 0x0) dup2(r1, r0) 01:02:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 701.591623][T13291] dlm: no local IP address has been set 01:02:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000440)='tasks\x00', 0x2, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x2, 0x3fe, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 701.644626][T13291] dlm: cannot start dlm lowcomms -107 01:02:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdeb}}], 0x3fffffffffffd33, 0x0, 0x0) 01:02:09 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) creat(0x0, 0x0) getpid() prctl$PR_SET_NAME(0xf, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) 01:02:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:10 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000280), &(0x7f00000002c0)=0x8) 01:02:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:02:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet_mreq(r3, 0x0, 0x23, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FITRIM(r4, 0xc0185879, 0x0) r5 = fcntl$dupfd(r0, 0x0, r1) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, 0x0, &(0x7f0000000080)) 01:02:10 executing program 5: setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = memfd_create(&(0x7f0000000080)='dev ', 0x3) write(r1, &(0x7f0000000380)="c2", 0x1) sendfile(r0, r1, &(0x7f0000000240), 0x9) clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$security_capability(r1, &(0x7f0000000100)='security.capability\x00', 0x0, 0x0, 0x0) 01:02:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/102387, 0x6f9de319) r1 = creat(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x2, 0x2, 0x4) ioctl$TIOCSRS485(r1, 0x542f, 0x0) 01:02:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r0, r1) clone(0x213102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000004c0)='./file0/../file0\x00', 0x0, 0x0) ioctl$TIOCMBIS(r2, 0x5416, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 702.788858][T13340] ================================================================== [ 702.796986][T13340] BUG: KCSAN: data-race in __skb_wait_for_more_packets / skb_queue_tail [ 702.805321][T13340] [ 702.807661][T13340] write to 0xffff8880b7387cd8 of 8 bytes by task 13313 on cpu 0: [ 702.815379][T13340] skb_queue_tail+0x7e/0xc0 [ 702.819885][T13340] unix_dgram_sendmsg+0x909/0xc80 [ 702.824914][T13340] sock_sendmsg+0x9f/0xc0 [ 702.829244][T13340] ___sys_sendmsg+0x2b7/0x5d0 [ 702.833932][T13340] __sys_sendmmsg+0x123/0x350 [ 702.838698][T13340] __x64_sys_sendmmsg+0x64/0x80 [ 702.843547][T13340] do_syscall_64+0xcc/0x370 [ 702.848046][T13340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 702.853922][T13340] [ 702.856250][T13340] read to 0xffff8880b7387cd8 of 8 bytes by task 13340 on cpu 1: [ 702.863877][T13340] __skb_wait_for_more_packets+0xfa/0x320 [ 702.869597][T13340] unix_dgram_recvmsg+0x181/0xba0 [ 702.874617][T13340] sock_recvmsg_nosec+0x5c/0x70 [ 702.879463][T13340] ___sys_recvmsg+0x1a0/0x3e0 [ 702.884145][T13340] do_recvmmsg+0x19a/0x5c0 [ 702.888557][T13340] __sys_recvmmsg+0x1ef/0x200 [ 702.893225][T13340] __x64_sys_recvmmsg+0x89/0xb0 [ 702.898066][T13340] do_syscall_64+0xcc/0x370 [ 702.902559][T13340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 702.908433][T13340] [ 702.910748][T13340] Reported by Kernel Concurrency Sanitizer on: [ 702.916896][T13340] CPU: 1 PID: 13340 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 702.924777][T13340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.934821][T13340] ================================================================== [ 702.942870][T13340] Kernel panic - not syncing: panic_on_warn set ... [ 702.949457][T13340] CPU: 1 PID: 13340 Comm: syz-executor.4 Not tainted 5.4.0-rc3+ #0 [ 702.957335][T13340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.967379][T13340] Call Trace: [ 702.970669][T13340] dump_stack+0xf5/0x159 [ 702.974910][T13340] panic+0x210/0x640 [ 702.978801][T13340] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 702.984873][T13340] ? vprintk_func+0x8d/0x140 [ 702.989460][T13340] kcsan_report.cold+0xc/0x10 [ 702.994129][T13340] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 702.999665][T13340] __tsan_read8+0x2c/0x30 [ 703.003998][T13340] __skb_wait_for_more_packets+0xfa/0x320 [ 703.009711][T13340] ? constant_test_bit+0x30/0x30 [ 703.014656][T13340] unix_dgram_recvmsg+0x181/0xba0 [ 703.019676][T13340] ? __tsan_write8+0x32/0x40 [ 703.024267][T13340] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 703.029937][T13340] ? copy_msghdr_from_user+0x246/0x320 [ 703.035386][T13340] ? unix_bind+0x770/0x770 [ 703.039794][T13340] ? unix_bind+0x770/0x770 [ 703.044203][T13340] sock_recvmsg_nosec+0x5c/0x70 [ 703.049047][T13340] ? __sock_tx_timestamp+0xb0/0xb0 [ 703.054149][T13340] ___sys_recvmsg+0x1a0/0x3e0 [ 703.058832][T13340] ? __fget+0xb8/0x1d0 [ 703.062912][T13340] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 703.068536][T13340] ? __fget_light+0xaf/0x190 [ 703.073121][T13340] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 703.078747][T13340] ? __tsan_write4+0x32/0x40 [ 703.083332][T13340] do_recvmmsg+0x19a/0x5c0 [ 703.087742][T13340] ? _raw_spin_unlock+0x4b/0x60 [ 703.092591][T13340] ? kcov_ioctl+0x53/0x200 [ 703.096999][T13340] ? kcov_close+0x20/0x20 [ 703.101336][T13340] __sys_recvmmsg+0x1ef/0x200 [ 703.106014][T13340] __x64_sys_recvmmsg+0x89/0xb0 [ 703.110864][T13340] do_syscall_64+0xcc/0x370 [ 703.115364][T13340] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 703.121243][T13340] RIP: 0033:0x459f49 [ 703.125134][T13340] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.144730][T13340] RSP: 002b:00007fbfe572ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 703.153139][T13340] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459f49 [ 703.161110][T13340] RDX: 03fffffffffffd33 RSI: 00000000200001c0 RDI: 0000000000000003 [ 703.169078][T13340] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 703.177037][T13340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbfe572f6d4 [ 703.185002][T13340] R13: 00000000004c78f7 R14: 00000000004dd768 R15: 00000000ffffffff [ 703.194351][T13340] Kernel Offset: disabled [ 703.198674][T13340] Rebooting in 86400 seconds..