[ 30.783855] kauditd_printk_skb: 7 callbacks suppressed [ 30.783861] audit: type=1800 audit(1566815380.908:33): pid=6698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 30.810811] audit: type=1800 audit(1566815380.908:34): pid=6698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 33.870617] random: sshd: uninitialized urandom read (32 bytes read) [ 34.147138] audit: type=1400 audit(1566815384.268:35): avc: denied { map } for pid=6872 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 34.197770] random: sshd: uninitialized urandom read (32 bytes read) [ 34.790225] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.57' (ECDSA) to the list of known hosts. [ 40.381953] random: sshd: uninitialized urandom read (32 bytes read) 2019/08/26 10:29:50 fuzzer started [ 40.576638] audit: type=1400 audit(1566815390.698:36): avc: denied { map } for pid=6882 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 42.486974] random: cc1: uninitialized urandom read (8 bytes read) 2019/08/26 10:29:53 dialing manager at 10.128.0.105:41345 2019/08/26 10:29:53 syscalls: 2466 2019/08/26 10:29:53 code coverage: enabled 2019/08/26 10:29:53 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/08/26 10:29:53 extra coverage: extra coverage is not supported by the kernel 2019/08/26 10:29:53 setuid sandbox: enabled 2019/08/26 10:29:53 namespace sandbox: enabled 2019/08/26 10:29:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/26 10:29:53 fault injection: enabled 2019/08/26 10:29:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/26 10:29:53 net packet injection: enabled 2019/08/26 10:29:53 net device setup: enabled [ 44.503100] random: crng init done 10:32:04 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x1) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4, 0x30, r0, 0x0) r1 = dup(r0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x4) connect$llc(r1, &(0x7f0000000040)={0x1a, 0x304, 0xeb6c, 0x7, 0x1ff, 0xffffffff, @broadcast}, 0x10) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r0, 0x6, 0xf84e, r1}) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000000c0)=""/87) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000140)) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) mq_unlink(&(0x7f0000000240)='trusted.overlay.opaque\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) ptrace$setsig(0x4203, r2, 0x101, &(0x7f00000002c0)={0x1d, 0x1, 0x10000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0xe0, r3, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x98}]}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'lapb0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x7}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfff, @ipv4={[], [], @empty}, 0x3f}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5d590a46}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x4}]}, 0xe0}, 0x1, 0x0, 0x0, 0x804}, 0x4844) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000540)=0x1, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000580)={@mcast2}, &(0x7f00000005c0)=0x14) write$sndseq(r1, &(0x7f0000000600), 0x0) accept$netrom(r1, &(0x7f0000000640)={{0x3, @bcast}, [@remote, @rose, @bcast, @default, @rose, @bcast, @remote, @rose]}, &(0x7f00000006c0)=0x48) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000700)={'icmp\x00'}, &(0x7f0000000740)=0x1e) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000780)=0x7) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000800)='y\x00', 0x2, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000840)={'bond_slave_1\x00', 0x100}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000880)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockname$netrom(r1, &(0x7f0000000900)={{0x3, @null}, [@netrom, @null, @netrom, @rose, @default, @netrom, @default, @netrom]}, &(0x7f0000000980)=0x48) write$P9_RLERRORu(r4, &(0x7f00000009c0)={0x13, 0x7, 0x2, {{0x6, 'lapb0\x00'}, 0x2}}, 0x13) r5 = syz_open_dev$sndpcmp(&(0x7f0000000a00)='/dev/snd/pcmC#D#p\x00', 0x6a6f, 0x80000) ioctl$SIOCX25SFACILITIES(r5, 0x89e3, &(0x7f0000000a40)={0xf, 0x8, 0x9, 0xa, 0x2, 0x81}) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r5, 0x31) 10:32:04 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x67, "ec5a23a31d2b9a25d6d6720ab7f10ed4816da485b4e78fef613f27acb917e7e05584c69fa38266c04b54d8eb63d1aa0f5df5dd64430bff74166d58a1370507080345bdcfa658379cd9e9dd6707589facebb4b254f825e12b6169e62c561bad9bc11bb77eef38e9"}, &(0x7f00000000c0)=0x6f) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x5}}}, &(0x7f00000001c0)=0x84) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3, 0x300) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r3, 0xc0305615, &(0x7f0000000280)={0x0, {0x8d, 0x6}}) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000640)={@loopback, @rand_addr, 0x0}, &(0x7f0000000680)=0xc) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000006c0)={r4, 0x1, 0x6, @local}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000700)=0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000740)={r2, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x10000}}, 0xfff}, &(0x7f0000000800)=0x90) epoll_pwait(r0, &(0x7f0000000840)=[{}, {}, {}, {}], 0x4, 0x401, &(0x7f0000000880)={0x9}, 0x8) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000900)) write$P9_RREADDIR(r5, &(0x7f0000000940)={0x103, 0x29, 0x1, {0x3, [{{0x80, 0x1, 0x4}, 0x2, 0x80000001, 0x7, './file0'}, {{0x0, 0x3, 0x4}, 0xb511, 0x9, 0x7, './file0'}, {{0x1e, 0x3, 0x1}, 0x0, 0x5, 0x7, './file0'}, {{0x0, 0x2, 0x5}, 0x408000000000, 0x0, 0x7, './file0'}, {{0x40, 0x4, 0x5}, 0x3f, 0x6, 0x7, './file0'}, {{0x80, 0x3, 0x6}, 0x6, 0x0, 0x7, './file0'}, {{0xa0eabf548a323d5, 0x1, 0x7}, 0x1, 0x100000001, 0x7, './file0'}, {{0x0, 0x4, 0x4}, 0x100, 0x38be, 0x7, './file0'}]}}, 0x103) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000a80)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f0000000ac0)={0x2}) ioctl$VT_ACTIVATE(r3, 0x5606, 0x5) socket$vsock_stream(0x28, 0x1, 0x0) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/qat_adf_ctl\x00', 0x183002, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000b40)) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000c00)=0x1000, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) r8 = getgid() r9 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000ec0)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000fc0)=0xe8) syz_mount_image$f2fs(&(0x7f0000000c40)='f2fs\x00', &(0x7f0000000c80)='./file0\x00', 0x1, 0x3, &(0x7f0000000e40)=[{&(0x7f0000000cc0)="eb151db4408ee29a683e02a2547b112442274e0f88bbb9878a456e19d4", 0x1d, 0x8}, {&(0x7f0000000d00)="e4e3ab5c37f7503cb14c7a81", 0xc, 0x7}, {&(0x7f0000000d40)="447a4945d5f69109a5b8c3beac82c082a53b938b437df496a77412d421d3c36a4ac201bcb42be873ec5a7fa6c4537488979af2a1d6d07566aaca33e1bb075986e4c7ef1e6ead60f2576db8f98389a6d64a0afa7ce995cf9309765e276ce942b7888aa673d5935669d9b6604e325e6d8ee86394a476b7f415ae8ba9d70eb36e2a03d9829cac335c02c34edd96a2205949dfd53379a00ed7235dac710daa8f6fc0a38204d0b58f4f3062a35fba7f32f075ea4fb4cd6afe09ab0a0b6c83f0248b7609bb2b32692a1ee450c645cbdde1", 0xce, 0x8}], 0x210000, &(0x7f0000001000)={[{@resgid={'resgid', 0x3d, r8}}, {@resuid={'resuid', 0x3d, r9}}, {@heap='heap'}, {@noacl='noacl'}, {@resuid={'resuid', 0x3d, r10}}, {@nobarrier='nobarrier'}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) ioctl$sock_inet6_udp_SIOCINQ(r7, 0x541b, &(0x7f0000001080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vga_arbiter\x00', 0x1c1080, 0x0) ioctl$EVIOCGMTSLOTS(r5, 0x8040450a, &(0x7f0000001100)=""/156) 10:32:04 executing program 3: io_setup(0xfffe, &(0x7f0000000300)) io_setup(0x8, &(0x7f0000000000)) 10:32:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {}, 0x0, [], [], [], [0x10001]}, 0x45c) 10:32:04 executing program 2: socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x38000000001, &(0x7f0000000040)=0x0) close(r0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) io_submit(r1, 0x20000000000002f6, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 10:32:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000040)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) shutdown(r2, 0x0) [ 174.555566] audit: type=1400 audit(1566815524.678:37): avc: denied { map } for pid=6882 comm="syz-fuzzer" path="/root/syzkaller-shm088703816" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 174.598493] audit: type=1400 audit(1566815524.698:38): avc: denied { map } for pid=6899 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13812 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 174.970950] IPVS: ftp: loaded support on port[0] = 21 [ 175.789268] chnl_net:caif_netlink_parms(): no params data found [ 175.797178] IPVS: ftp: loaded support on port[0] = 21 [ 175.829241] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.836034] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.843052] device bridge_slave_0 entered promiscuous mode [ 175.849822] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.856609] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.863748] device bridge_slave_1 entered promiscuous mode [ 175.885098] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 175.898270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 175.919232] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 175.926426] team0: Port device team_slave_0 added [ 175.934294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 175.941494] team0: Port device team_slave_1 added [ 175.949783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 175.957401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 175.991200] IPVS: ftp: loaded support on port[0] = 21 [ 176.011917] device hsr_slave_0 entered promiscuous mode [ 176.060404] device hsr_slave_1 entered promiscuous mode [ 176.120632] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 176.131255] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 176.203238] chnl_net:caif_netlink_parms(): no params data found [ 176.220343] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.226783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.233666] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.239992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.313999] IPVS: ftp: loaded support on port[0] = 21 [ 176.323621] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.330112] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.337242] device bridge_slave_0 entered promiscuous mode [ 176.343679] chnl_net:caif_netlink_parms(): no params data found [ 176.355938] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.362532] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.369340] device bridge_slave_1 entered promiscuous mode [ 176.390356] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.399138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.425456] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 176.432630] team0: Port device team_slave_0 added [ 176.438555] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 176.445782] team0: Port device team_slave_1 added [ 176.453091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 176.468131] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 176.474327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.485125] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 176.514357] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 176.583118] device hsr_slave_0 entered promiscuous mode [ 176.620334] device hsr_slave_1 entered promiscuous mode [ 176.660401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.678713] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.685829] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.698031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 176.704560] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.711189] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.717843] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.718807] IPVS: ftp: loaded support on port[0] = 21 [ 176.730257] device bridge_slave_0 entered promiscuous mode [ 176.737751] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 176.745038] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 176.769199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.777209] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.783593] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.798608] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 176.806326] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.813909] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.821379] device bridge_slave_1 entered promiscuous mode [ 176.856538] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 176.864009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.871614] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.877945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.902685] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 176.915697] chnl_net:caif_netlink_parms(): no params data found [ 176.935177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 176.953798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 176.980009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.987852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.995632] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.005796] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 177.014574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.022970] IPVS: ftp: loaded support on port[0] = 21 [ 177.029738] team0: Port device team_slave_0 added [ 177.054783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.062668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.072208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 177.079532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.086847] team0: Port device team_slave_1 added [ 177.092374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.103746] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.110703] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.117680] device bridge_slave_0 entered promiscuous mode [ 177.124686] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.131735] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.138868] device bridge_slave_1 entered promiscuous mode [ 177.145769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.153315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.161204] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.183512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 177.215284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.223709] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.232949] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 177.238978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.292055] device hsr_slave_0 entered promiscuous mode [ 177.360330] device hsr_slave_1 entered promiscuous mode [ 177.401634] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 177.410903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.449401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.457071] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.465032] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 177.493981] chnl_net:caif_netlink_parms(): no params data found [ 177.537333] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 177.550772] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.557808] team0: Port device team_slave_0 added [ 177.563502] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 177.571232] team0: Port device team_slave_1 added [ 177.579127] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 177.592983] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.599493] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.607064] device bridge_slave_0 entered promiscuous mode [ 177.613905] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 177.623621] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.629959] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.637762] device bridge_slave_1 entered promiscuous mode [ 177.646024] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 177.655500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 177.667896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.674889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.684731] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.695133] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 177.717322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 177.727769] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 177.734019] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.742520] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.755050] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 177.777436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.787423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.795099] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.801457] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.808590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.863463] device hsr_slave_0 entered promiscuous mode [ 177.920572] device hsr_slave_1 entered promiscuous mode [ 177.970268] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 177.977327] team0: Port device team_slave_0 added [ 177.986220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.994240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.002407] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.010414] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.016782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.024178] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 178.031552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 178.050511] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.057597] team0: Port device team_slave_1 added [ 178.064935] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.076614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 10:32:08 executing program 5: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc04c5349, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) [ 178.122982] chnl_net:caif_netlink_parms(): no params data found [ 178.132242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.146108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.153262] audit: type=1400 audit(1566815528.268:39): avc: denied { create } for pid=6934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 178.179918] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.187614] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.188869] audit: type=1400 audit(1566815528.268:40): avc: denied { write } for pid=6934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:32:08 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) creat(0x0, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="d3d0b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e39808e0b61a0bf7a301ffe8dac0726906da58a5d1ab066f24351eda628769d37cbcb5c0c5dbc1b227d10d8ea", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee45101ed000029a741efca44f937d0495354364fff41f9a38fcb2482ba837296d961244e2e1473693871072af9e33be9317f899e552a57548cbcf4e8083897cc275fd87f333c960d2bc40d5887fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d8fef515583873d6d56ce424602b1894ef", @ANYRESHEX], 0x0, 0x120}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 178.224401] audit: type=1400 audit(1566815528.268:41): avc: denied { read } for pid=6934 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 178.252094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 178.262756] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.269728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.277521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.292377] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.306277] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready 10:32:08 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='syscall\x00') preadv(r0, &(0x7f00000017c0), 0x19b, 0x0) [ 178.328167] ptrace attach of "/root/syz-executor.5"[6942] was attempted by "/root/syz-executor.5"[6943] [ 178.364184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:32:08 executing program 5: 10:32:08 executing program 5: 10:32:08 executing program 5: [ 178.373088] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.386925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 10:32:08 executing program 5: [ 178.436224] device hsr_slave_0 entered promiscuous mode [ 178.490656] device hsr_slave_1 entered promiscuous mode [ 178.544815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.552427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.562447] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 178.574116] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 178.585310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.593760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.601941] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 178.607932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.620875] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 178.628447] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.635075] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.642475] device bridge_slave_0 entered promiscuous mode [ 178.649006] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.655400] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.662476] device bridge_slave_1 entered promiscuous mode [ 178.671362] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.697094] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 178.705446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.716217] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 178.726356] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.746246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 178.753750] team0: Port device team_slave_0 added [ 178.759442] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 178.769200] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 178.776620] team0: Port device team_slave_1 added [ 178.785208] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 178.794375] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 178.800803] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.809020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 178.816837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 178.837032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.843974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.854088] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.866257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 178.902249] device hsr_slave_0 entered promiscuous mode [ 178.940423] device hsr_slave_1 entered promiscuous mode [ 178.980710] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 178.987601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.995457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.003082] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.009398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.017029] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.026262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.036354] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 179.046553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.056743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.064594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.072293] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.078622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.093492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.102335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.111758] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 179.127387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.134184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.142193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.149424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.158418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.167538] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 179.174021] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.181343] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 179.190323] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.196741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.213394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.224576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.233859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.241389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.249185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.256878] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.263246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.270850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.278355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.286108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.293723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.302229] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 179.308448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.316504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.323638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.330735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.339401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.357036] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 179.366752] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 179.374495] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.384399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.393043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.400703] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.407046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.407424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.416879] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 179.428235] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 179.429431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.446737] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 179.447161] QAT: Invalid ioctl [ 179.456477] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 179.465259] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 179.472629] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 179.476921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 179.484514] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 179.488929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.501255] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 179.504535] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.522548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.529930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.537508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.545193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.552863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.560740] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.567072] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.574042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.583431] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 179.589461] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 179.606115] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.614567] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 179.622064] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 179.636999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.645645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.653833] QAT: Invalid ioctl [ 179.658440] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.667133] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.673511] bridge0: port 2(bridge_slave_1) entered forwarding state 10:32:09 executing program 0: [ 179.682399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.705115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 179.716744] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 179.724867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.737008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.747175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.763232] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 179.776136] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 179.783458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.791438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.798870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.807276] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.816200] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 179.825044] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.832971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 179.839922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 179.847130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.855446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.865609] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 179.871929] 8021q: adding VLAN 0 to HW filter on device team0 [ 179.880839] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 179.889098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 179.897142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.905369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.911942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.919754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.927619] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.934063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.941265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.948701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.956203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.963991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.971948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.979020] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.987981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 179.997488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 180.009700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.018154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.028899] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.035294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.044726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 180.053463] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 180.064676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.073840] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 180.086118] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.093996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.102120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.109642] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.117520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 180.127310] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 180.133811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.143029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.151864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 180.158700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.167137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.174834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.182560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.190562] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.198659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.210673] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 180.218590] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.229394] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 180.236064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.243713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.251473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.259123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.266868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.278366] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 180.290930] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.311288] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 180.322598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 180.332341] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.342497] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 180.354248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.362059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 180.368921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.381383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.394882] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 180.401843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.416777] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 180.428840] 8021q: adding VLAN 0 to HW filter on device batadv0 10:32:11 executing program 3: 10:32:11 executing program 5: 10:32:11 executing program 0: 10:32:11 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc08c5332, &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 10:32:11 executing program 2: 10:32:11 executing program 1: 10:32:11 executing program 0: 10:32:11 executing program 3: 10:32:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/9, 0x9}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r3, 0x0) recvmsg(r1, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000180)=""/40, 0x28}, {0x0}, {0x0}, {0x0}], 0x4}, 0x2) shutdown(r4, 0x0) shutdown(r2, 0x0) 10:32:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="ea"], 0x1) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) 10:32:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000040)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xffffff2e, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) shutdown(r2, 0x0) 10:32:11 executing program 3: r0 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)=ANY=[@ANYBLOB="0c00000000000000d718bbd1bb50f326fb67895a1919eae332b84feb9f0a53e90b22f8c42b98a11f280a1c9a95d5f1e537d0bb6c22550e97e57dedb4b7c8a8c64e284f3c288b6863a2c8ac72f83f5050cab54218903d88853dfb57a58ec125e4ce910241332351ca0f55804a2d1707dfa1e583792f49ae8ead376c9a4dcab4f4a0a2d8ea3ff31195159c6597bfbf6ed9598aa5a7fbbbbd99813123808c49639ffc48bc711835c2a5fe35cec665f50a432ba889889cddde9413"], 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xca}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 10:32:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB=',lowerdir=.:file0']) setuid(0xee01) syz_open_dev$video4linux(&(0x7f0000000140)='/dev/v4l-subdev#\x00', 0x96, 0x80) chdir(&(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{0x20, 'overlay\x00'}, {0x20, 'user$$selinux'}, {0x20, 'overlay\x00'}, {0x20, 'overlay\x00'}, {}, {0x20, '#*GPL!(\x99cpusetwlan0%vboxnet0'}], 0xa, "93a31260f480abf3ce399a8732dde8b873708401e88ff22b6393c39ecdcbec3492490d42d2f6185ac3acb006c92bc48da1c5fded6ea627678337f41211"}, 0x8f) 10:32:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21}, 0x22d) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000000)={0x3, 0x4, 0x5, 0x5, 'syz0\x00', 0x1}) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0xfffffffffffffd7c) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f00000000c0)=0x2, 0x4) sendto$inet(r1, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003c80), 0x38e, 0x62, 0x0) 10:32:11 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r0 = perf_event_open(&(0x7f0000000040)={0x800000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340)={0x0, @local, @multicast2}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'rose0\x00', r2}) getpeername(r1, &(0x7f0000000140)=@tipc=@name, &(0x7f0000000000)=0x80) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="105085d14c0323d38041567f5e84b0b467aa316ce6c700000000000000000000000000000000001a184d0296cdc9ef441d078d8ef16cb61ebdfe89905f809ef4e8c489ed5ff2c03af66ec72ee58ebd5f880497c1f8a33b2de09613b6d2e5899a88814ed1942d343e4c2a031dd4256d8e005e313e7d34edf52febab"], 0x28}}, 0x0) r3 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x40, 0x109840) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000200)) r4 = dup3(r0, r1, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0), 0x4) [ 181.862569] hrtimer: interrupt took 28220 ns [ 181.884942] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 181.939456] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 10:32:12 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) 10:32:12 executing program 0: r0 = inotify_init1(0x80000) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) move_pages(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 10:32:12 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x10000, 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0xdc2}, {0x0, 0x0, 0x9}]}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000480)=""/4096) fcntl$setstatus(r1, 0x4, 0x6000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0), 0x4) io_setup(0x7d, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140)="73844ae89d", 0x5}]) 10:32:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x400000, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6e6, 0x8000) socket$caif_seqpacket(0x25, 0x5, 0x4) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, 0xffffffffffffffff, &(0x7f0000000180)) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000100)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@dev, 0x0}, &(0x7f00000001c0)=0x14) bind$bt_hci(r1, &(0x7f00000002c0)={0x1f, r2, 0x1}, 0xc) 10:32:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x11, 0x803, 0x0) r2 = socket$inet(0x2, 0x80003, 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000004bc0)={0xf, @output={0x1000, 0x1, {0x2, 0x9a}, 0x19d80d49, 0x9}}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000780)={@local, 0x0}, &(0x7f00000007c0)=0x14) connect$can_bcm(r3, &(0x7f0000000800)={0x1d, r4}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x8, 0x1) r5 = dup3(r2, r1, 0x0) recvmmsg(r1, &(0x7f0000004940)=[{{&(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/173, 0xad}], 0x3}, 0x3}, {{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000680)=""/154, 0x9a}, {&(0x7f0000004cc0)=""/206, 0xce}, {&(0x7f0000000840)=""/80, 0x50}, {&(0x7f00000008c0)=""/75, 0x4b}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/109, 0x6d}], 0x6, &(0x7f0000001a40)=""/102, 0x66}, 0x400}, {{&(0x7f0000001ac0)=@caif=@dbg, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001b40)=""/121, 0x79}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/90, 0x5a}, {&(0x7f0000002c40)=""/113, 0x71}, {&(0x7f0000002cc0)=""/191, 0xbf}, {&(0x7f0000002d80)=""/144, 0x90}, {&(0x7f0000002e40)=""/232, 0xe8}], 0x7}, 0x8000}, {{&(0x7f0000002fc0)=@x25={0x9, @remote}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003040)=""/136, 0x88}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000004100)=""/250, 0xfa}, {&(0x7f0000004200)=""/216, 0xd8}, {&(0x7f0000004300)=""/255, 0xff}, {&(0x7f0000004400)=""/145, 0x91}], 0x6, &(0x7f0000004540)}, 0x1}, {{&(0x7f0000004580)=@nfc, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004600)=""/179, 0xb3}], 0x1, &(0x7f0000004ac0)=""/108, 0x6c}, 0x2}, {{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f0000004780)=""/217, 0xd9}, {&(0x7f0000004b40)=""/87, 0x57}], 0x2}, 0xaffa}], 0x4, 0x22, 0x0) connect$x25(r1, &(0x7f0000004540)={0x9, @null=' \x00'}, 0x12) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000240)={0xd0, 0x7, 0x3, 0xd1, &(0x7f0000000040)=""/209, 0x16, &(0x7f0000000140)=""/22, 0xb4, &(0x7f0000000180)=""/180}) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f0000004dc0)=""/251) 10:32:12 executing program 3: syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x6e, 0x0, 0x0, 0xff, 0x0, 0x2, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, &(0x7f00000000c0)) r1 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r1, &(0x7f0000000400)=""/68, 0x44) r2 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000280)) r4 = gettid() sched_setaffinity(r4, 0x1, &(0x7f00000001c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000d40)={0x7, 0x0, 0x8000000000008}) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) keyctl$setperm(0x5, r1, 0x21c0508) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000400), 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(0xffffffffffffffff, 0x0, 0x100) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@remote, @in6=@local}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) 10:32:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f0000000580)=ANY=[@ANYBLOB="04030000", @ANYRES16=r3, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000010) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r4, 0xffffffffffffffc1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x98) [ 182.658720] QAT: Invalid ioctl 10:32:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000140)={'tummy0\x00', @ifru_data=&(0x7f0000000080)="9116e4e46c788e77f90b704c7d61310af2b973759cac50f497aaf2fc524c95e6"}) [ 182.724663] QAT: Invalid ioctl 10:32:12 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = creat(0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x1000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000340)={r4, 0x41b, &(0x7f0000000440)=[@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x0, @multicast1}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e24, 0x0, @rand_addr="1fb87edf1c0d03cbc7d9defe8b225765", 0x7fff}]}, &(0x7f00000003c0)=0x10) getsockopt$inet_mreqsrc(r3, 0x0, 0x0, 0x0, 0x0) unshare(0x400) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) shutdown(0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@sha1={0x1, "4a942f0622377da32417602209c212abe3ae5e0f"}, 0x15, 0x2) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x20000, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x8000000000000800, 0x0) semtimedop(0x0, &(0x7f0000000400)=[{0x2, 0x5, 0x800}], 0x1, &(0x7f0000000080)) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) listen(r2, 0x618) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x810c5701, &(0x7f00000004c0)) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r6) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x6000) 10:32:12 executing program 2: socket$vsock_dgram(0x28, 0x2, 0x0) r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x15, 0x805, 0x0) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000700)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) listen(r0, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 182.747792] QAT: Invalid ioctl 10:32:12 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xe3bf, 0x92a310eb8916ca1f) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000105, 0x110, r0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000440)=0x3) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x2271, &(0x7f00000003c0)=ANY=[@ANYBLOB="564c691c368c4fca1cfebcdc312dbede34971c1ef4bfa393f7b4913cffcbd21d44bf270ac0057e054e9e51e6213d6b059d6131744f1e46daba12c3ae2d787f71403738c35b41a7b990fecda9448e", @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="df32750f591435d2ea03604237630fe42919f97a7e4d83f05d767a3a55f61faac1a61a7ccbdae08dbde71762cf942543bf8b32db0005a5e35517bcead5222de6b717f33cc0e8e4c5960a14966d059bc47fe910f5734e5632d1ac23494f3b24f95e7fcc4961bc0c63b8e9a2ccab19d38aed3b39780165968ce8dce8d3fc36fc64233ab1018f3ed62744e09875e8d7a023902707", @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES64=0x0, @ANYBLOB="eca2b643c1cfaf38e8173adc6b792d2e36eceb75af230c9d39fb8d66e1821bc830db8a6f9e63f5a41d22d4c26cd5fe4cc5ffdf34d695bc888d15148a6d81fc144c49693f404dc2cfa9e11f4eacdbf4cdb71c63801b42beb1f32ab5a3931883d08ca73506083fa9d2670df4", @ANYRESOCT=r0, @ANYPTR64, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRES32=r0, @ANYRESOCT=r0], @ANYRES16=r0, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="551a11b8e2c2b4ce7b8f6b334270b343c17739feabca2b99f36023343e81bd56b401b8c8c92a00a4d3d236d3fed1b6ae61060551ae29c309aea615439c5d3957ec3f3042eb19e48992fb38e0ebb0de314aae97ef9d662e06f2dd4e7fdc7167e56ffbc7db705508d8016980a4282e9a0b5ab358e8f033c400ffa06b0d0ee438e71c80006488ac64bc3bb2c9526e5873943a804cd962d40f93fde33591f52d75607903fffd3a850bf4a935064c", @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYPTR64], @ANYRESDEC=r0], @ANYPTR64, @ANYRESOCT=r0]) r1 = dup3(r0, r0, 0x80000) write$P9_RREMOVE(r1, &(0x7f00000000c0)={0x7, 0x7b, 0x2}, 0x7) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x9, 0x8, 0x800}) 10:32:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000180)="d38100ffe6002b452b7b4f0a7ff32588e4b3a5e608000000", 0x18, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000400)={r1, r2, r1}, &(0x7f0000000500)=""/83, 0xfffffef6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 10:32:12 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0xf77163c593c181f2) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) pwritev(r1, &(0x7f0000001cc0)=[{&(0x7f00000006c0)="4d9d9eaaee013b815a5c601c5bd570556c0a11386f8b11c0b1dcf2930ba165e681894c6a223d97c7e51b67d41f022a58d2ac0cf0f70314a447cee222bcb162a5656d994a548fef92b3ff28bee2d80552209ada9f5c6fbf0e6e2be81cec86cd60710de5bcb415418df4d2fe6f0b580cb5cd69bd62054b2a680eac1827bb359d9244009c75946ad356e04315e9c48ff0b62dc37c7d08bf41033035bcb93c31d02f31bcca89e5e6ffdc0f8071b6343a", 0xae}, {0x0}, {&(0x7f0000000380)="b529852c73d93bc8c56ccc0f3bd673f0", 0x10}, {&(0x7f0000000880)}, {0x0}, {&(0x7f0000000b00)}, {0x0}], 0x7, 0x8) pwritev(r0, 0x0, 0xfffffffffffffff9, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = dup2(r2, r2) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0xc8800, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) connect$tipc(r5, &(0x7f00000002c0)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10) r7 = dup(r3) r8 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x2100, 0x0) ioctl$TIOCMSET(r8, 0x5418, &(0x7f00000001c0)=0x8) chdir(&(0x7f0000000440)='./file0\x00') ioctl$KVM_IRQ_LINE(r7, 0x4008ae61, &(0x7f0000000200)={0x0, 0x4}) umount2(&(0x7f0000000400)='./file0\x00', 0xa) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r9) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0\x00', 0x7) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x2c0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffff801) 10:32:13 executing program 1: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, &(0x7f0000000480)) 10:32:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)=ANY=[@ANYBLOB="37fd03009262372708ffcc00c0fec8c03b4c3cc988dd81d3e844b0d2aff90d221e4fa2cf8057cc3c8acdf3031e17e6f4dbdca24cfa82498866d56c64fcc3d29e2043bb811719652c3c296a96b461271d618d8b31e1be5a09a95512d19b17bf6642e8ba42778973d0f1bf36b4e38b9838385f295db12ad7af7f777bd0c24c28fbf481a5cceb84ee438431101df40404e5bc037203ad05b600061a9ff63197d76c0e51d8c93de8e0b1c083e0a94426a30420ebd143fa3d7544b9ba3267434cd5aa45cd26c983"], 0x20}], 0x4}, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4c6801, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 10:32:13 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x43e) fsetxattr$security_selinux(r0, &(0x7f0000000c80)='security.selinux\x00', &(0x7f0000000cc0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e, 0x0) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f00000000c0)={0x283}) 10:32:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000fdbff8)=[{&(0x7f0000000040)="290000002100190000003fffffffda260200000000e80001040000040d001400ea1108000025001e00", 0x29}], 0x1) [ 183.166460] FAT-fs (loop3): bogus number of reserved sectors [ 183.187678] audit: type=1400 audit(1566815533.308:42): avc: denied { relabelto } for pid=7143 comm="syz-executor.5" name="file0" dev="sda1" ino=16575 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 183.201164] FAT-fs (loop3): Can't find a valid FAT filesystem 10:32:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r1, 0x0) [ 183.318275] audit: type=1400 audit(1566815533.348:43): avc: denied { execute } for pid=7143 comm="syz-executor.5" name="file0" dev="sda1" ino=16575 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 183.377721] audit: type=1400 audit(1566815533.348:44): avc: denied { execute_no_trans } for pid=7143 comm="syz-executor.5" path="/root/syzkaller-testdir965264420/syzkaller.jwWFGd/12/file0" dev="sda1" ino=16575 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 183.409337] audit: type=1400 audit(1566815533.438:45): avc: denied { unlink } for pid=6904 comm="syz-executor.5" name="file0" dev="sda1" ino=16575 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 183.511059] FAT-fs (loop3): bogus number of reserved sectors [ 183.516988] FAT-fs (loop3): Can't find a valid FAT filesystem 10:32:13 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="600300000c015231a6c0301dcaaddf250500000a", @ANYBLOB="740081008ca31de4df3b54c91df8a31be46a014d8ae8f40fc22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bcf1e4d5d627b9d0911da0beb35242e326b37b3ed118732bb0cbf909651c8c600fbde031f3161edefb1678c06eb9644ce21b8e89e5300004c001f00ff6a4518c96e4179"], 0x9b}, 0x1, 0x0, 0x0, 0x40080}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="48010000", @ANYRES16, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000140)=0x2) 10:32:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:32:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRES32], 0x2f2) sendfile(r1, r2, &(0x7f0000000000), 0xffff) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = accept(r3, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000300)=0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x5, &(0x7f0000000340)=0x7f, 0x4) fcntl$addseals(r2, 0x409, 0x8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x1) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000240)) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x424200, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0bc5351, &(0x7f0000000180)={0x8, 0x1, 'client1\x00', 0x4, "c27b708edcfaa595", "09dc39c1e45fa37fda2679c9b7b6661092595dc45f2fd11dd924bd824375c25a", 0x1, 0x6fc}) 10:32:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0x0, 0x0, 0x1, [], &(0x7f0000000240)={0xa10907, 0x5, [], @p_u8=&(0x7f0000000200)}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100), 0x0, 0xfffffffffffffff8) r3 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='eth0&\x00', 0xfffffffffffffffc) keyctl$link(0x8, r2, r3) r4 = socket$inet(0x10, 0x800, 0x5) sendmsg(r4, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000040607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 10:32:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000140)=0xe8) bind$bt_hci(r1, &(0x7f0000000180)={0x1f, r2}, 0xc) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$UI_DEV_DESTROY(r0, 0x5502) 10:32:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f00000002c0)={'syz1', "591696138a894f2c5a772df9da1f4c220971a009538e596058b0a8c0e7066fff1bd67d9b942548cdde2297f2210cc124a3b28d7db3c38eb0b15a29855e3194ab7c4d1bcbef25bb2d2e6060623d4a3c7711352f1609e8d2e0b259"}, 0x5e) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000001c0)=0x54) preadv(r2, &(0x7f0000000480), 0x10000000000000f3, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200101, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x100000000) 10:32:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2850, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x3, 0x7c2f876d3ae81264) getresuid(&(0x7f00000004c0), 0x0, &(0x7f00000006c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) [ 183.724776] QAT: Invalid ioctl 10:32:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRES32], 0x2f2) sendfile(r1, r2, &(0x7f0000000000), 0xffff) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = accept(r3, &(0x7f0000000280)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000300)=0x80) setsockopt$inet6_dccp_int(r4, 0x21, 0x5, &(0x7f0000000340)=0x7f, 0x4) fcntl$addseals(r2, 0x409, 0x8) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x1) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000240)) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x424200, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r5, 0xc0bc5351, &(0x7f0000000180)={0x8, 0x1, 'client1\x00', 0x4, "c27b708edcfaa595", "09dc39c1e45fa37fda2679c9b7b6661092595dc45f2fd11dd924bd824375c25a", 0x1, 0x6fc}) 10:32:13 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001940)="5500000018007fafb62d1cb2a4a280930206000000a843096c2623692500080021000000000000000000a3c728f1c46b7bffffdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bfec6bab91d400", 0x55}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000100)) socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x10}}}) [ 183.816441] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:32:14 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000040)='\x00', 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) dup3(r0, r2, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="00fb92010795e1de4a8a5cfec284bbeded32b1a4c7e28461dccf6f0171b74105dc37c450133479d28426dd0433e18c656bb17ea265f127c4e7b4ab6d0c699f09fef957b0eeabf167d7c89ede0d0f0cc729c1f6628d412bd4cdd98be3989e07e3aaf77dfbb677545a4c0eb77bf8ff91b631f2950e5e0e717adef366b9f7382704959121f952b7280ca3c4"], 0x1, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a000000ff0340ffff00"/24], 0x18) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x20000, 0x0) [ 183.882287] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 183.920275] protocol 88fb is buggy, dev hsr_slave_0 [ 183.925501] protocol 88fb is buggy, dev hsr_slave_1 10:32:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2850, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x3, 0x7c2f876d3ae81264) getresuid(&(0x7f00000004c0), 0x0, &(0x7f00000006c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 10:32:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2850, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x3, 0x7c2f876d3ae81264) getresuid(&(0x7f00000004c0), 0x0, &(0x7f00000006c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) [ 184.019449] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 184.092757] EXT4-fs error (device loop4): ext4_iget:4866: inode #2: comm syz-executor.4: bad extended attribute block 1935762276 [ 184.138395] EXT4-fs (loop4): get root inode failed [ 184.148363] EXT4-fs (loop4): mount failed [ 184.160783] protocol 88fb is buggy, dev hsr_slave_0 [ 184.166142] protocol 88fb is buggy, dev hsr_slave_1 [ 184.297464] QAT: Invalid ioctl 10:32:14 executing program 2: unshare(0x400) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x6, &(0x7f0000001340)=[{&(0x7f0000000080)="363306f5c828365bb2436ead503ac0", 0xf, 0x31}, {&(0x7f0000000340)="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", 0x1000, 0xffff}, {&(0x7f0000000140)="c47b847f9fc9ba06c5c13dc3b1f53b707fa6c078943410c38ffa4c625d39f1fb0ca0982e0527085328ad61746a843872e29b55a567afc904f820124dfb6140857d9a97a5dadbaeb149e113759deae3e66a018e2da85b43485a1dc875672980ce12cdc3dd6eafba84ef37a184f7c511954433295e76816625333d3dbe5a7780be4303f7e0863bf87ef9d5f8f5e7cc9ee4aafb1185e6a19e5109f3a73715e8a1ec8cddf7afc85d5d3de079d600e6fcd73c3dcd5ab797b47703ac2f", 0xba, 0x7fff}, {&(0x7f00000000c0)="6cde3b00a90343d9d6a3d79ed32c4e4fe9db60816c0e1e06121c78d47768a5", 0x1f, 0x3}, {&(0x7f0000000200)="a3075ac0d89d2e014e3e54f2129c0864fa713dff0b09d35ebbc28130d5d8c848c6e7b32198a7", 0x26, 0x1}, {&(0x7f0000000240)="25a0348b082b74c70342864c8f0756ca546dfd5128317ec02f26e868ae566a1719ae52b65b411e288ae5b3", 0x2b, 0x6}], 0x80, &(0x7f0000001480)=ANY=[@ANYBLOB='resize=0x0000000000000c87,gid=', @ANYRESHEX=r1, @ANYBLOB="2c726573697a653d44fa3eb9913f303030303030303030303030303033662c6e6f71756f74612c646973636172643d3078303030303030303030303030383030302c67727071756f74612c696e746567726974792c696f636861727365743d6b6f69382d722c6e6f718ba674612c71756f74612c6d61736b3d5e4d41595f524541442c66756e633d4d4f44554c455f434845434b2c6d61736b3d5e4d41595f415050454e442c617564"]) r2 = fanotify_init(0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x2000, 0x0) accept4$tipc(r3, &(0x7f0000001580)=@id, &(0x7f00000015c0)=0x10, 0x80000) fanotify_mark(r2, 0x11, 0x20, r0, 0x0) [ 184.415203] jfs: Unrecognized mount option "resize=Dú>¹‘?000000000000003f" or missing value 10:32:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0xb1, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 10:32:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2850, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x3, 0x7c2f876d3ae81264) getresuid(&(0x7f00000004c0), 0x0, &(0x7f00000006c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 10:32:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x6d, &(0x7f0000000480)={r1, @in={{0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x100) 10:32:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x4840, 0x0) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000000240)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) pipe2(0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000280)={0x5, 0x0, 0x80, 0x2, 0x7}, 0x14) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0xfffffffffffffffc) fallocate(r0, 0x40, 0x0, 0x7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x8}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value={r4, 0xb1c}, &(0x7f0000000600)=0x8) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000380)="5e6e4b54ae17832b3029d29b4d06e71ead4ca66be3d90bc2cbea35e3d94429150c8617de44d5d823fc49ec33e6bcb84c92d1f8bae8a2253dcd5a6b459b735b7b509f6f968408", 0x46) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) accept(r3, &(0x7f0000000480)=@isdn, &(0x7f0000000400)=0x80) write$FUSE_DIRENT(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="80000000000000000400000000000000000000000000000002a5d471350000000800003f00000d0000000072ff7f0000000008000000060000006f7665726c6179000500000000000000020000000000000015000000040000006367726f7570406367726f75702874727573746564008000"/128], 0x80) renameat(r5, &(0x7f0000000180)='.//ile0\x00', r5, &(0x7f00000007c0)='./file0/f.le.\x00') 10:32:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xffc2) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xfec8}], 0x1}}], 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x3f, 0x12) 10:32:14 executing program 4: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000080)={0x9, 0xd09f, 0x101}) write(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x12000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x80, 0xa, [0x9, 0x6, 0x2, 0x9b4, 0x7, 0xffffffff, 0x3ff, 0x0, 0xd33, 0x1398]}, &(0x7f0000000380)=0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000003c0)={r3, 0x10000, 0xd41, 0x2, 0x495d, 0x20}, 0x14) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401ef02000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPOUT\x00', &(0x7f00000002c0)='\x88[\x00', 0x3, 0x1) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) 10:32:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x11, 0x1a001000000}, [@ldst={0x5, 0x5, 0x2000cf66, 0x0, 0xf001}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) signalfd(r0, &(0x7f0000000040)={0x2}, 0x8) [ 184.696457] overlayfs: failed to resolve './file1': -2 [ 184.720709] protocol 88fb is buggy, dev hsr_slave_0 [ 184.726188] protocol 88fb is buggy, dev hsr_slave_1 10:32:14 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8000, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x40000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000001c0)={0x2, r0, 0x1}) ioctl(r2, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) keyctl$set_reqkey_keyring(0xe, 0x2) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x10', 0x0, 0x4c00000000006800}, &(0x7f0000001fee)='R\x10sG\bV\xf2\xaf\xa8WL\xa8\x1f\xb5\x9f\xab\ri', 0x0) [ 184.796290] FAT-fs (loop4): Directory bread(block 61185) failed [ 184.803090] protocol 88fb is buggy, dev hsr_slave_0 [ 184.803567] protocol 88fb is buggy, dev hsr_slave_1 10:32:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f00000000c0)=""/127, &(0x7f0000000140)=0x7f) truncate(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@v2={0x3, 0x2, 0x9, 0x7, 0x11, "addf9aff9658c8e4942ccac1f4b5cc8301"}, 0x1b, 0x1) fcntl$setlease(r0, 0x400, 0x2) [ 184.841527] FAT-fs (loop4): Directory bread(block 61186) failed [ 184.849490] FAT-fs (loop4): Directory bread(block 61187) failed [ 184.862831] FAT-fs (loop4): Directory bread(block 61188) failed [ 184.885095] FAT-fs (loop4): Directory bread(block 61189) failed 10:32:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x80, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x80001ffffffffffe) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x2850, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='sysv\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, 0x0) syz_open_dev$midi(&(0x7f0000000a40)='/dev/midi#\x00', 0x3, 0x7c2f876d3ae81264) getresuid(&(0x7f00000004c0), 0x0, &(0x7f00000006c0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) fchdir(r0) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) [ 184.908124] FAT-fs (loop4): Directory bread(block 61190) failed [ 184.919081] Unknown ioctl 21665 10:32:15 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101002, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000140)=[0xe347, 0x80, 0x6, 0xffffffffffffff7c, 0x4, 0x4], 0x6, 0x6, 0x1a, 0x0, 0x7fffffff, 0x7, {0x7, 0x7, 0x80000001, 0xfffffffffffffff7, 0x6, 0x2, 0x81, 0x5, 0x8, 0x7, 0x9, 0x100000000, 0x5, 0xd121, "2b7e9d7d58b37a45a0dafdd3f5f0068992ad858d1ec374269167d5dd08597d48"}}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000100)={{}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="80fd0f969341", 0x6}], 0x1, 0x0) 10:32:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x3f, 0x0, 0x1, 0x0, 0x81, 0x201, 0x4, 0x8, 0x6, 0x10000, 0xa96, 0x1, 0x1, 0x4, 0x3e, 0x1ff, 0x0, 0x8, 0x19f761ac, 0x101, 0xfff, 0x2, 0xffff, 0x80000001, 0x6, 0x4, 0x9, 0x3f, 0x9, 0x401, 0xff, 0x3ff, 0x7ff, 0x1, 0x6, 0x0, 0x3f, 0x1, @perf_config_ext={0xfff, 0x8}, 0x10, 0x2, 0x4, 0x8, 0xbf, 0xfffffffffffffffc, 0xdc48}, r1, 0x4, r0, 0x2) preadv(r0, &(0x7f0000001a40)=[{&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000280)=""/202, 0xca}, {&(0x7f0000000380)=""/247, 0xf7}, {&(0x7f0000001780)=""/152, 0x98}, {&(0x7f0000000200)=""/11, 0xb}, {&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000001840)=""/181, 0xb5}, {&(0x7f0000003080)=""/4096, 0x1000}, {&(0x7f0000001900)=""/147, 0x93}, {&(0x7f00000019c0)=""/78, 0x4e}], 0xa, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='./file0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREADDIR(r2, &(0x7f0000000540)={0x21b, 0x29, 0x1, {0x1, [{{0x40, 0x3, 0x8}, 0x7, 0x7, 0x7, './file0'}, {{0x40, 0x4, 0x4}, 0x5b, 0x401, 0x4d, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/'}, {{0x1, 0x4, 0x7}, 0x2, 0x1a7, 0x7, './file0'}, {{0x4, 0x1, 0x4}, 0x4, 0x6, 0x4d, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/'}, {{0xc0, 0x3}, 0xffffffffffff8001, 0x4, 0x7, './file0'}, {{0x9, 0x4, 0x4}, 0xb14a, 0x1, 0x4d, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/'}, {{0x0, 0x1, 0x6}, 0x9, 0x276, 0x7, './file0'}, {{0x10, 0x4, 0x1}, 0x8, 0x6, 0x4d, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/'}]}}, 0x21b) unlink(&(0x7f0000000180)='./file0\x00') [ 184.948799] FAT-fs (loop4): Directory bread(block 61191) failed [ 184.960094] protocol 88fb is buggy, dev hsr_slave_0 [ 184.965249] protocol 88fb is buggy, dev hsr_slave_1 [ 184.965982] Unknown ioctl 21665 [ 184.984913] FAT-fs (loop4): Directory bread(block 61192) failed [ 185.042068] FAT-fs (loop4): Directory bread(block 61193) failed [ 185.083830] FAT-fs (loop4): Directory bread(block 61194) failed 10:32:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x200000) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000040)={0x100000, 0x10000}) r3 = syz_open_procfs(r1, &(0x7f0000000240)='net/ip_mr_vif\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40, 0x0) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:32:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000000), 0x1000000000000420, 0x0) 10:32:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0xffffffffffffffff, 0x100, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x4) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000000)) 10:32:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000e4e000)=0x200000000) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f0000000000)=""/24, 0x18, 0x0, 0x0, 0x2}}, 0x68) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x33d, 0x0) 10:32:15 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000002c0)=[@in6={0xa, 0x0, 0x0, @local, 0x1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x1f, "9b615af9b3d59e0f17d92a847487cf891f141273f7b8c871549f16b6bd87c5"}, &(0x7f0000000040)=0x27) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0xfff}, 0x8) 10:32:15 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80000001, 0x121000) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000080)="a31f5aeb6730b8ef51889bcc389bb87c5ba6dc8acc63bbd43e47ba4e2c80ae561f28496b46e4da143f95fde08ab38c3462e5935fbd1d9548c8cf68d8ef13ff9a895cf034de58292102c1483403248dd4650e6c0a9e7fb421b249725ea224385e31d2f53ccae5ec0db231c8f9ea0ada34e2e9cc66a5b113d8b09a11725347e22f2437ea2bb5892d27ca44377dc9c2985f66e862dab3c2c4cb10a28679a5efa77adc04695af694747e29") recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/134}], 0x100000000000032d, 0x0) 10:32:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000001340)="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", 0x83d, 0x0, 0x0, 0x0) 10:32:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000080)={0x3, 0x607}, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x3210) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) fadvise64(r0, 0x0, 0x8000, 0x1) sched_setattr(0x0, &(0x7f00000002c0)={0xfefd, 0x5, 0x0, 0x0, 0x2}, 0x0) 10:32:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000100)={[0x6, 0x0, 0x0, 0x0, 0x2000000004, 0x0, 0xff], 0x1f004}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f00000000c0)={0x8dec, 0x7}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 185.449057] sctp: [Deprecated]: syz-executor.1 (pid 7324) Use of struct sctp_assoc_value in delayed_ack socket option. [ 185.449057] Use struct sctp_sack_info instead 10:32:15 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000200007041dfffd946f6105000202000a1f000002002808000800040004000300", 0x24}], 0x1}, 0x0) 10:32:15 executing program 1: r0 = accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000400), 0x10) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0xad) clone(0x100003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x1) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000440)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0xfe) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) add_key$user(&(0x7f0000000100)='user\x00', 0x0, &(0x7f0000000340), 0x0, 0xfffffffffffffffc) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000082) write$nbd(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x84) sendfile(r3, r3, &(0x7f0000000200), 0xa198) 10:32:15 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x4, 0x4, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x4}, 0x3c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f00000001c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000340), r3, 0x6}}, 0x18) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000226bd7000ffdbdf250d00000008000220029d9c39097cc6015f4d5ec0b02d46de922f6f00000030000300140002106272696467653024855e91000000000008000800ff0000000800080005000000080008000400000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x4044015) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000140)={0x4, 0x80000000, 0x0, 0x5, 0xffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0xfffffe9e, &(0x7f0000000280)={0x0, 0x0}}, 0x10) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r2, 0x210, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa0}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80de}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) [ 185.526216] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:32:15 executing program 0: syz_open_dev$media(&(0x7f0000000740)='/dev/media#\x00', 0x6, 0x1) r0 = syz_open_dev$admmidi(&(0x7f0000000780)='/dev/admmidi#\x00', 0x800, 0x200a00) r1 = openat$cgroup_ro(r0, &(0x7f00000009c0)='cpuset.effective_mems\x00', 0x26e1, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0xf7da6f992e2b42a5, 0x7fc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f00000006c0)=0xc) sched_setaffinity(r3, 0x8, &(0x7f0000000300)=0x6) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1f, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_bp, 0x4000010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffdc1) ioctl(r4, 0x0, &(0x7f00000007c0)="76333423553f6234488dd25d762070") socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r6 = socket(0xa, 0x3, 0x8) r7 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000800)=0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000440)=r8) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x10}) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000002c0)) setsockopt$IP_VS_SO_SET_DELDEST(r6, 0x0, 0x488, &(0x7f0000000080)={{0x6c, @remote, 0x4e24, 0x3, 'lblcr\x00', 0x1e, 0x0, 0x13}, {@remote, 0x4e21, 0x7, 0xffff, 0x7f, 0x2}}, 0xfffffffffffffd4d) r9 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02\x05\x00\x00\x00\xac', 0x0) write$binfmt_misc(r7, &(0x7f0000000c40)=ANY=[], 0x0) close(r2) r10 = dup3(r1, r9, 0x10000) setsockopt$inet_sctp_SCTP_EVENTS(r10, 0x84, 0xb, &(0x7f0000000280)={0x0, 0x1, 0x40, 0x7, 0x1f, 0x6, 0x100000000, 0x8001, 0x7d, 0x2, 0x86}, 0xb) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x6}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[]}}, 0xffffffffbffffffc) r11 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$nl_route(r11, &(0x7f0000000400)={&(0x7f0000000000), 0xff3c, &(0x7f0000000240)={&(0x7f00000003c0)=@ipv4_newrule={0x2c, 0x20, 0xf29, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc}]}, 0x2c}}, 0x20000) sendmsg$key(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c0b5bd1cf5925e3f57702796092712cd7b371a64937a2dc55cb9287bc77a51ff173fe677ae6d60ccbc48734bc72bad46487b4b6721ac9f0be174a8b04934e170ca6bed16351d8e8d4a4b4fe45f23286dbaa959a4cc2ea9d735d6e2fef0b5278b63e39e35ecd498cfcd210b31020f7c1d45cf003e8be45cce568dfd943b2b54c581ef9123f14f13fb9b9f2e3e04c88b4a698db8acdec3833d108e782e30762935fa0b1521e420cddc62a05f33c5618479e5e54d6b5936f0c094538e1e8031d484f4d4a16cff9e426966cdcaee25ddfac44847f6b95686def0b449bb997ae6e000000000000000000000000000000000000000000000000007a83e6021cc623786dc89e67673ea1d9f62dccab267f9116c92f2e4f17df8810cd683b06e8e3788daedcf8f54ac38a393124c9168538c47496b16009c77c0395b97953771c16be85edbc9a73150d280be9f52f07557d25efe43492ee53c58499fe2881248dbc51de", @ANYRESDEC=r2], 0x174}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x10c}}, 0x0) [ 185.596196] QAT: Invalid ioctl 10:32:15 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {}, 0x0, 0x2}, 0xe) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9a8, 0x80400) 10:32:15 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000180), 0x4) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100)={{0xfffffffffffffffd}, 0x10}, 0x10) [ 185.649502] QAT: Invalid ioctl [ 185.669242] bridge0: port 3(team0) entered blocking state 10:32:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000680)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='./file0'], &(0x7f00000001c0)='./file0\x00', 0x0, 0x201000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x7080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) 10:32:15 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) bind$bt_l2cap(r0, &(0x7f0000000100), 0x6) listen(r0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x800, 0x0) [ 185.717132] bridge0: port 3(team0) entered disabled state 10:32:15 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = socket(0x5, 0x80000, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000180007041dfffd946f6105000a00000a1f00000b042808000800160004006700", 0x24}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x6, 0xa6, 0x4, 0x8, 0x80000001, 0xe7, 0x81, {0x0, @in6={{0xa, 0x4e20, 0x39, @remote, 0x4}}, 0xffffffffffffffff, 0x7fff, 0x200, 0x10001, 0x1}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r3, 0x9}, &(0x7f0000000280)=0x8) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x20000, 0x0) recvmmsg(r2, &(0x7f0000000540)=[{{&(0x7f00000003c0)=@isdn, 0x80, &(0x7f0000000340)=[{&(0x7f0000000440)=""/228, 0xe4}], 0x1}, 0x3}], 0x1, 0x40010100, 0x0) sendto$rose(r1, &(0x7f00000002c0)="e0335268bf47482351d9a9b98407413c0be7c0481777d47f0c39258d3029fe6e14055309d115fec807f242b5c9f3ad9fdf2feeb35a9f32d8538ea39d91546cbdae7fe0939d1fa9ff3f68a4b5fd7ac7de34bbf606fcbb1efde24a0cdf65ba3b6889", 0x61, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000100)="c5f55cc02ef4275e1fe28c9155d543e1", 0x10) 10:32:15 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x14, 0x1, "c568a5f67e54da1d6ca368dc43268512299642bece8b5d883a11c9e2df76e91564551b0e42088375bc2f3d82ac29f53f79181b5b021cd4e1167b805a229a1409", "0111273b3e9c26ab2543cf8648be61542638b0179c98a2233ca8bb556d0b9dde", [0x7f, 0x10001]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000100)={0x7, 0x8, 0xfa00, {r2, 0x8}}, 0x10) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x290000, 0x0) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000140)) [ 185.809775] device team0 entered promiscuous mode [ 185.826448] device team_slave_0 entered promiscuous mode [ 185.846597] device team_slave_1 entered promiscuous mode 10:32:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = gettid() r3 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x5d, 0x325680) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x778, 0xc, 0x3, 0x0, 0xd672, 0xbd9e102015e1236f, 0x5, 0x7, 0x7fffffff80, 0x1f, 0x400, 0x8f, 0xb8d9, 0x10001, 0x7ff, 0x8, 0x7c000000000, 0x4401, 0x9a1, 0x8, 0x8001, 0x9, 0xffffffff, 0x3, 0x10000, 0x62, 0x6, 0x6a6c, 0x9, 0x3f, 0x1, 0x2, 0x8, 0x9, 0x8a9c, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0xffffffffffff7fff, 0xfffffffffffffffe}, 0x200, 0x7625, 0x1, 0x3, 0x8001, 0x5, 0x7d3}, r2, 0xb, r3, 0xb) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000040)) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r4, 0xc00c642d, &(0x7f0000000180)={r5, 0x80000, r4}) [ 185.875698] audit: type=1400 audit(1566815535.998:46): avc: denied { associate } for pid=7368 comm="syz-executor.3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 185.912073] bridge0: port 3(team0) entered blocking state [ 185.917999] bridge0: port 3(team0) entered forwarding state 10:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = getpgid(0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = dup(r0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) keyctl$set_timeout(0xf, r2, 0x800) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x38) ptrace$cont(0x18, r4, 0x0, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x6, 0x0, 0xc7}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r4, 0x0, 0x0) r6 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r8 = getegid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000400)={{0x100, r7, r8, r9, r10, 0x10, 0x100}, 0x0, 0x7, 0x4, 0x9, r4, r1, 0xfffffffffffffff9}) 10:32:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000540)='/dev/full\x00', 0x10000, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000580)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000000a0160101, 0x0, 0x0, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) write$binfmt_script(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfdef) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x40, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000052c0)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x2b}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@coaddr={0x14}]}, 0x104}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000380)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x3c, 0x0, 0x0) fstat(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() fchownat(r5, &(0x7f0000000340)='./file0\x00', r7, r8, 0x400) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000240)={0x0, 0x3000}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) personality(0x4100001) lsetxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "d3848f2b9ae16dd09700fe88cc3d2e3fc9a9e31f"}, 0x15, 0x2) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x5, 0x0, "87bfd073d2441178b50d1333caec5ee39cf101901a428fe49eb9e4552bdbf7cb6f1f31e6463be5d05f9ca3f5fd419165e7dac23195da09b1ff693f05082833f7f60b1bc4f2e0ec68f369a60c6fd08021"}, 0xd8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 10:32:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="38f3c4004f01158c510479000000000000000000"], 0x0, 0x14}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:16 executing program 4: r0 = memfd_create(&(0x7f0000000300)='\x0f\x02\x80\x05,\x04\xad\xe5\xba\xed\xfa\x9c:!)\xa1\ff\x9a\xeazo\xf1\tB\xd9`_\x05,g\x10KSW\x92Q\xcbo\xdfJ|\xe2\x9bc/\x13\x93-\bH=\xf3\xd1\xb6\xd98\xf5\xc9\xf4\xf8\xa5Ci\x8c\xc6\x85(7\xdc\x12,\b\xca\x88i88\n{H\xe9\x7f[\xea\'\\\x06h\xc9\x14v\x14 \xef\x12\xe5\xa9>\x1e\"\\\x9f@\x1e\xc1\xee1JJ\xa8\xb2\x15\t\xbet\x90\x92', 0x0) write$eventfd(r0, &(0x7f0000000100)=0x20000000000080, 0x8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0xffffffffffffcf4e, {{0xa, 0x1, 0x2, @mcast2, 0x1}}, {{0xa, 0x4e23, 0x8001, @mcast1, 0x4}}}, 0x108) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe000)=nil, 0xe000, 0x2000005, 0x12, r0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, 'dh\x00'}, 0x1cf) 10:32:16 executing program 0: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{r1, r2+10000000}, {0x0, 0x989680}}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000080)={{0x4, 0x4, 0x2, 0x3, 'syz0\x00', 0x8000000}, 0x1, [0x8000, 0x1, 0x1ff, 0x80000000, 0x8, 0x5, 0x1f, 0x3ff, 0xfffffffffffffff7, 0xffffffffffffffb3, 0x437, 0x1ff, 0x3, 0x34800000, 0x2, 0x0, 0xfb33e9d, 0x2, 0xb47f, 0x92, 0x7fffffff, 0x200, 0x8, 0xfffffffffffff744, 0x3f, 0x20, 0xffffffffffffff81, 0x978, 0x8, 0x92, 0x6, 0xe324, 0xffffffff, 0x5, 0x9, 0xfffffffffffffffc, 0x9, 0x3, 0x3, 0x4, 0x2, 0x4, 0xb8c, 0x1000, 0x81, 0x9, 0x4, 0x0, 0x40, 0x3, 0x400, 0x101, 0x2, 0x3ff, 0x7022, 0x0, 0x8, 0x7, 0x2, 0x7, 0x5, 0x4010, 0x9, 0xfffffffffffffffe, 0x10000, 0xe64f, 0x6, 0x8001, 0x8, 0x3, 0x1c77, 0xffffffff, 0x2, 0x0, 0x100, 0x363, 0x5, 0x62, 0x6e, 0xb2fc, 0x5, 0x2, 0x80, 0x5, 0x3, 0x1f, 0x2, 0x1f, 0x9, 0x6, 0x3, 0x101, 0x1, 0x7, 0x3, 0xfffffffffffffa4c, 0xffff, 0x6, 0x8, 0x1, 0x9e, 0x1, 0x80000000, 0x6, 0x8001, 0x1f, 0x7fe00, 0x5, 0x800, 0x7fd, 0xedd6, 0x3, 0x400, 0x2, 0x98, 0xa21f, 0x42f, 0xfffffffffffffffb, 0x9, 0x9, 0x7fffffff, 0x38de, 0xdfcc, 0x1, 0x10000, 0x800, 0x800]}) close(r0) r3 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x8, 0x101000) pwritev(r3, &(0x7f0000000700)=[{&(0x7f00000005c0)="a9d645848505d632b617ae6b4f5fcdba4615c8cadf4969f964c04a165d14904e51aa45f078c90d0f3a23c3c124bcde616cdc2894656c7490f3c933cf93687312705a137b76a5624b6740d1ac13291e6dc6a7e368ae3adaa60916a46860f3bdd4a589ed72feef893a4d0aad4b081b856773cda4fd11f86c3e062bbc0c155a703738651fcaae95e7c061d4930f970bc25a7f8ba00fdc03f97fd38d02bd8277383636e97f00c0d3542d034ab6646166683bb862d6", 0xb3}, {&(0x7f0000000680)="aceb5f648c2b65d935ec8450273459ff3bea502eb22452fa63a91857d31949cc4d5d44868b07928ae6d02b79454a85b00b7a12564bee48207eb3716c584cc517af8405dfe190afafbae4ae6e2c828d726f32990f", 0x54}], 0x2, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') r5 = request_key(&(0x7f0000000b80)='pkcs7_test\x00', &(0x7f0000000bc0)={'syz', 0x0}, &(0x7f0000000c00)='syz0\x00', 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000c40)='keyring\x00', &(0x7f0000000c80)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r5, r6) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000a00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000009c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="db40d7c6", @ANYRES16=r4, @ANYBLOB="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"], 0x1fc}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) ioctl$TIOCSTI(r3, 0x5412, 0x6c8c) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x24, r7, 0x300, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x840}, 0x400c1) 10:32:16 executing program 1: syz_emit_ethernet(0xdd, &(0x7f00000004c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb08050209f787ff1660167b20f45cde2312b5a9b17cdcd126104d46ab6d901509bf4ce06726a95193ea72b058f92f5e9cbf5a11a128517b1263e7954a3faecb44df1251d0885f3a374d4d9f4a3b73aaa8e5bb7dafdc2ea8ec56579d77e120d191af5d1bbd9982e209bc668fa5e61952f9ca7cfe9125034153c9bea5fd6ef53650b51c1a64d1a7ef4c3e92f3bbb50fe87cb7775b8b0fbc4f0500d9f22248b91a6a7296eea052323a23ca6192658d046bfc8bff5fd93e118804e87bc87e9d1c410252a26d8a432a411fc2690b"], 0x0) r0 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='-\x00', 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="e016e79aaf0ff7e352651608afa08fb02a1237cbfaedc0039a32e75a04e8b95577cce502e123c11915a7a99d73a843bbd3356a3889f4caff60ab0979595b673d78d187923252333ec59b6a56b0a9c118ebae7b7067bd94b56dcd200e7c72303eecc6811f0394e0021dcb7d7e2fabe76dc806e2e4b2e80451dac9fd3cf5a7d9a0a95fbfca9ac5d154729cc47abcb2adc5d3ead1ac25d73810893a798f646441b2ad3a857684ff72ab73ffadc7852762f1dfdd3ac8bed5e2a13fb70113342068637c7ce1e22ddb12492b21283b7b", 0xcd, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000005c0)="8b6831f9da3ce7ff78c373697e2409cf1ab7dc930de1bac38cf18a3698467ef165b5b3d6bf796911efeb472eb18cdefaf2d5d79f62c801d5b848773cd7c660a9d0ee4ce96c496d223f3c15fe197da54396849957de36d26a82fc5162f548e7af1ced64b8f0e8e7652373ebb703a6f13b7c39cf282ea24f27f5b47395c304d992f27e7e7b546189b9b65f326c5f4512bec5fafc91c4f01539e4961e37304f251ef825ffbcc298f49a64bcc836540df845acd9799c820884b53043ea603c17acf7d5772666505fb091d3c40fe914b8a1ed69292e76b82293c502c44ee08af0f2c746255bea6f034cd1838705f75c6c3a4545552f57", 0xf4, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000300)={r0, r1, r2}, &(0x7f0000000340)=""/79, 0x4f, &(0x7f0000000440)={&(0x7f00000003c0)={'cmac-aes-neon\x00'}, &(0x7f0000000400)="b4cb709b21722d21b8b4f28e1995534de6a078440bdba56e843fcf8f8cd97c54ab34c805fcf4c9f5a31570a118f198dc3215", 0x32}) 10:32:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x5, 0x3, [0x7, 0x800, 0x1ff]}, &(0x7f0000000140)=0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000180)={r3, 0x9}, &(0x7f0000000200)=0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, 0x0, &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000440), &(0x7f0000000200)}, 0x12e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000200), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) 10:32:16 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = getpid() setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x6, 0xfffffffffffffffb, 0x20, 0x6}, 0x8) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000001180)) ptrace$getregs(0xe, r1, 0x0, &(0x7f0000000180)=""/4096) 10:32:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="1b000000540081aee4056c00040000fe078bffff0d000000f000c3", 0x1b}], 0x1}, 0x0) socket$packet(0x11, 0x3, 0x300) [ 186.349891] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 186.371194] audit: type=1400 audit(1566815536.498:47): avc: denied { map } for pid=7412 comm="syz-executor.4" path=2F6D656D66643A0F0280052C04ADE5BAEDFA9C3A2129A10C669AEA7A6FF10942D9605F052C67104B53579251CB6FDF4A7CE29B632F13932D08483DF3D1B6D938F5C9F4F8A543698CC6852837DC122C08CA886938380A7B48E97F5BEA275C0668C914761420EF12E5A93E1E225C9F401EC1EE314A4AA8B21509BE749092202864656C6574656429 dev="tmpfs" ino=26423 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 186.394973] PF_BRIDGE: br_mdb_parse() with invalid attr [ 186.454720] could not allocate digest TFM handle cmac-aes-neon 10:32:16 executing program 2: openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/member\x00', 0x2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0x5, 0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r1, &(0x7f0000000180)="08d8b88f0c7b5b609dcb151573359b8a4dec511116294b8fa6b89d8e87a8d767bbdbbdda106a93ed6325d05b143e6f1a41360975dd604412ab6a178c56d9ed58", &(0x7f00000001c0)="b01fc722375953d9e4bfbd89fca563e74703cf2780acb4e10efdbccf0cc5d95c9fdd7cba3c0285ba7697ea3079ea3bb8a331b6645028a9cbfa8d04850eea99220d5e1c8c0648cf9fe955b6915ac9fcf1820eca5659b55b21bf5022679abbdafb060e287c5f"}, 0x20) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000100)=0x7, 0x4) syz_emit_ethernet(0x381, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000700000000000019078ac2314bbac1414110302907800000000450000000000000000010000ac2314aaac141400084000000000000000000000e000000200000000e000000100000000000000007f00000100000000ffffff40d1755c00e000000100000000ac14140000000000"], 0x0) epoll_create(0x7) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000280)={0xff, 0x1ff, 0x9}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) r4 = add_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="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", 0x1000, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r3, r4) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000340)={0x28, 0x2, 0x0, {0x1, 0x2, 0xfffffffffffffe00}}, 0x28) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x3, r1}) 10:32:16 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r1) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") close(r2) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 10:32:16 executing program 1: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) write$selinux_access(r1, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000000140)=[{r2}], 0x1, 0xffffffffffbffff8) r3 = dup2(r1, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000080)=""/121) ioctl(r4, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) 10:32:16 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x82000, 0xcd) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f00000000c0)) r1 = memfd_create(&(0x7f0000000180)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000007140)=""/122, 0x7a) 10:32:16 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10080, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x8001) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x240, 0x0) 10:32:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x101000, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000380)={0x80000000, 0x0, "9ee95bd84b7a462ba9f1d2921887ccfafe4e49705fb5948dc7a9895116dea4f2", 0x6, 0x1ff, 0x50, 0x401, 0x6, 0x0, 0x3, 0x12414cc, [0x63, 0x6, 0xbc, 0x80000000]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="640ff24101660f08f20f1bfa0f20e06635000040000f22e0bad004b00fee36260f01dfaa8fc900010b0f080f005b9a", 0x2f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x9, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x61, &(0x7f0000000480)={'filter\x00', 0x4}, 0x68) perf_event_open(0x0, r4, 0xe, 0xffffffffffffffff, 0x8) clone(0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 10:32:17 executing program 4: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x80800, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, &(0x7f0000000300)=0x6) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000088995bc278078530907ba8daf19580c9613ff8c2531d48e56c969a3543034571923a2c0e75ecb55217584fce8cbddbd735b9d223dd4ca810697ce8f93d0755ee710b002c231a5731dc6a16792b1319e2acc0eb1ba8116a4ae39f9429436c5e0eadfe"], 0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = creat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x1, 0x1, 0x7fffffff, 0x6, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r3, 0x3, 0x10, 0x3, 0x10001}, &(0x7f0000000180)=0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2321212c0f0df81f47442a"], 0x10094) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[], 0xab) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="a5fd89583f8d155f"], 0x1a000) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0'}, 0xb) 10:32:17 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x7ff) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000140)='\x00', 0x1, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) syncfs(0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) write$FUSE_DIRENT(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="300000000000e30005000000000000f40000000000000000090000a58b1678cb08e9241c817cfd2cad000000000049f6098ededd8debef8d06646155630001"], 0x30) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001240)={'icmp6\x00'}, &(0x7f0000001280)=0x1e) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000300)={0xffffffffffffffff}) r2 = getpgrp(0x0) ptrace$setsig(0x4203, r2, 0x10001, &(0x7f0000000180)={0x22, 0x400, 0x5}) 10:32:17 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x18000000000, 0x80000) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000140)={0x7, @raw_data="c0775aebc9a07b362bfbaf3f2797726faf490fbb15953ccbf7cbc02878fa720a71f20d435ba3561835b741a04bf57ab07bac54c71eccee141150bc645b48ac80c0310b657ccbafe039914194a36333ed8312153f89fc075aba07fbf44e2678e355194d8961978d27d70e956290eed38726eaf8ffc7e03266d1930cdd45cffcef2600c62c6d2f57ac23a81b4499a2278eae099706387ac323e573b4977f6f0351abbb68ad9640ab5a9aa725a4e62f4f432f14bef6c76cdede61fe857b422a7e85accd78ca163ef0d4"}) 10:32:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000180)=0x7, &(0x7f00000001c0)=0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r3, 0x40047451, &(0x7f0000000280)=0xfff) sendto$inet(r2, 0x0, 0xfffffffffffffdab, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socket$isdn_base(0x22, 0x3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='mounts\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1b) listen(r0, 0x4) ioctl$SIOCAX25GETINFOOLD(r4, 0x89e9, &(0x7f0000000140)) 10:32:17 executing program 2: openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffff87}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 10:32:17 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x18000000000, 0x80000) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000140)={0x7, @raw_data="c0775aebc9a07b362bfbaf3f2797726faf490fbb15953ccbf7cbc02878fa720a71f20d435ba3561835b741a04bf57ab07bac54c71eccee141150bc645b48ac80c0310b657ccbafe039914194a36333ed8312153f89fc075aba07fbf44e2678e355194d8961978d27d70e956290eed38726eaf8ffc7e03266d1930cdd45cffcef2600c62c6d2f57ac23a81b4499a2278eae099706387ac323e573b4977f6f0351abbb68ad9640ab5a9aa725a4e62f4f432f14bef6c76cdede61fe857b422a7e85accd78ca163ef0d4"}) 10:32:17 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x500, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000014c0)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0x8001, 0x3, &(0x7f0000001680)=[{&(0x7f0000001580)="ad569c36d541cfb6b3ef492309b187852142fb98508e6501b80f3bc3771544f900ca1677600eb82536f5344b3c8568864800644c17013ee1105a3699db9cbd7ac161fee85ef0f8fca52189391f8ecab2f3b269cbf08658c370d909036cc937d8bba7f2e132146e4b62c15bfd6bab4654beb82494dd654ad06fbedd6eb11f9eb581b3fadb608f6cfcfe24ee5795cf1f9e19af3493256d621f055ec2a2102953b70a58252d2085b5b489090cb83dd44ee22dd7c3ffe2e17267515e841e00d7d783158c6adbb9296458e9809dde24147b516b5609ea914fa4cfc2265ce31c51762af8a1853ae060145eddb5a2127e46af", 0xef, 0x7}, {&(0x7f0000000400)="3658fbe0bcf2529aae4bb3197c3c63e85b71b4d7182fc211d2fb1324c245a8062dc425e4f15bf0a62cd466c0267dfc49eb3720b02e76d83a359114f8c10d232bf846c997ce5a0dc7fff18686d3b0b6e0b9a1ea61893047884191a13a0701356779f1064f121f64a193", 0x69}, {&(0x7f0000000340), 0x0, 0x7c589c76}], 0x2000000, &(0x7f00000017c0)={[{@decompose='decompose'}], [{@dont_measure='dont_measure'}, {@uid_gt={'uid>', r2}}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYPTR64, @ANYPTR64, @ANYRES32=r1], 0x26) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000280)={0x3ff, 0x5, 0x3d5, 0x100000001, 0x5, 0x400, 0x6, 0x3, 0x6, 0x8, 0x81, 0x3}) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = socket$inet6(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000380)) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0)=""/4096, 0x1000, 0x40000000, &(0x7f00000003c0)={0x11, 0x16, 0x0, 0x1, 0x3, 0x6, @remote}, 0x14) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0xfffffffffffffffe, @ipv4={[], [], @loopback}}, 0x1c) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e00000010000000000000000080012000200020000010000000000003000000003030000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$sock_void(r3, 0x1, 0x24, 0x0, 0x0) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f0000000140)) [ 187.632199] hfsplus: unable to parse mount options [ 187.742654] IPVS: ftp: loaded support on port[0] = 21 10:32:18 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0xffff, 0xdd}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 10:32:18 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x5000000, 0x0, 0x700000000000000, 0x0, 0x0, r1, &(0x7f0000000340), 0xfdef}]) 10:32:18 executing program 2: r0 = socket$inet(0x10, 0x3, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80000, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, r2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x6) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) 10:32:18 executing program 4: delete_module(&(0x7f0000000140)='\x00', 0x800) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsync(r0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200000, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @empty}, {0xa, 0x0, 0x200, @dev}, r2}}, 0x48) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x106, 0x2}}, 0x20) 10:32:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$rds(0x15, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4f60, 0x80000) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="0e31944b018f742bf86e22055a017dd1e82ea2c1a1b504b8abd11b881d768c1f00d8fc1aaf5c3799d807dcd738b12547f6eda8225b4bb01108332b64e2933b52b7da6c9f69989df9013ce5e4ea99a30b9d5d710d2b690fc50fc99d4d9cce2ec48cc3b3ce175369076cbd2c1fc2a6c276521e2e4ae26d0cf83cc2ca89bba345abab455184c64e72ed663f8f3a227063c72a322869d62c661010b437bf296afa5a14fea0481726c34e2470a6b92338c8da1b8aa41c0cc57bd2bfaae231dddeb8a17f5f0413a46b07c0872a155265562f2610dc85b9cd3bb19ebd", 0xd9, 0xfffffffffffffffc) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000100)={0x3e6f4ea7348c40e7, 0x0, 0x2, 0x4, {0x0, 0x80000001, 0x8001, 0x3ff}}) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$get_persistent(0x4, r4, r5) 10:32:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x8000) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x8, @mcast1={0xff, 0x1, [0x9]}}]}}}]}, 0x48}}, 0x0) [ 188.311731] audit: type=1400 audit(1566815538.438:48): avc: denied { map } for pid=7538 comm="syz-executor.2" path="/proc/7538/net/pfkey" dev="proc" ino=4026533178 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1 10:32:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0xffffffff, 0x0, 0x9}, 0x20) r3 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x10, "f310321a4362913da93bbdb4b9c7fc1a"}, &(0x7f00000002c0)=0x18) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e23, 0x100, @local, 0xfd}}}, 0x84) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0xb) ftruncate(r5, 0x200004) getgid() write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r6, 0x8}}, 0x10) sendfile(r1, r5, 0x0, 0x80001d00c0d0) 10:32:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000300), 0xfffffffffffffd66) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) connect$tipc(r2, &(0x7f0000000180)=@name={0x1e, 0x2, 0x0, {{0x43}, 0x4}}, 0x10) clone(0x2902001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000400)=""/4096) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) getdents64(r5, &(0x7f0000001400)=""/235, 0xeb) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)={0x0, 0x3, 0x141}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ptrace(0x10, r6) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000001640)="a0090688721ae748a8fbb880ca0715c4ecd35ec88745b68b012c101909b1c21faa734d7ed892f39239da239696865037873f3d730159cdfad1378de5c615a0978df75a028e97f5d993236ce761102a81aa8e31d050e52c4122d55533832661edba725b6049fa63dae0660814ce9b8b1267b5cc82237403c48e39d15d9817dce3fdb12d65a6a5515884e43f") prlimit64(r6, 0x8, &(0x7f0000000240)={0x100000000, 0x63f9}, &(0x7f0000000280)) ptrace(0x4207, r6) fcntl$lock(r3, 0x7, &(0x7f0000000380)={0x0, 0x2, 0x7fff, 0x2, r6}) ioctl$RTC_PIE_OFF(r5, 0x7006) rt_tgsigqueueinfo(r6, r6, 0x27, &(0x7f0000000080)={0x31, 0x629, 0x800000000000400}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4, 0x2, 0x9, 0x4, 0x19, 0xde6, 0x0, 0x400, 0x4, 0xdb, 0x4, 0x5}) clone(0x2102001fb9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) 10:32:18 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x200002, 0x0) r1 = getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) sendmsg$unix(r0, &(0x7f0000000b80)={&(0x7f00000005c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1c0000000000000001000000020098081b83a326994ab7980c230c3e7b1f00becf91c76f9b5c0b046765f424cdddf6f8d84183aef18942a6c8e8fe7a9ad848dda34ecb568afc674e793bdc9a2769002ac13ccd1885caea59daf82256588bb229d7fb953cf1ff86157fa770dd6196d80f8eece11c0fdf2d79617d9111e3d1c67a093bf8ab8d266e33369f327cb1ea6211fcd09a4acdeead", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x38, 0x80}, 0x20000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000540)={0x2, 0x0, 0x2, 0xc0000000, 0x100000000, 0x0, 0x1}) r4 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000280)={0x7, 0x0, 'client1\x00', 0x3, "aa910a574ad66d45", "4da870ba178e36359c1c9894568fcb5192b3a8824926d79d2a30929543ba324c", 0x4, 0x3}) ioctl$CAPI_NCCI_GETUNIT(r4, 0x80044327, &(0x7f0000000240)=0x9) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) ptrace(0x11, r1) 10:32:18 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) fcntl$setlease(r0, 0x400, 0x6f81b5dfe00e7d58) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000040)=0xfffffffffffffffd, 0x2) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000000c0)) 10:32:18 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000080)=0x10097, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x50000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000240)={@rand_addr, 0x0}, &(0x7f0000000280)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000002c0)={r3, 0x1, 0x6, @remote}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x40000, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/36, 0xfffffffffffffe33}, 0x2000) sendmmsg(r0, &(0x7f00000000c0), 0x182, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x400, 0x40000) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f00000001c0)={0x7fffffff, 0x8, 0xfffffffffffff001}, 0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getgroups(0x2, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff]) write$P9_RGETATTR(r4, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x400, {0x65, 0x3, 0x6}, 0x20, r5, r6, 0x5, 0x3, 0x20, 0x7, 0x1f, 0xffffffff80000000, 0x10000, 0xffffffffd249c2e6, 0x6, 0x401, 0x80000000, 0x8, 0x8, 0x4, 0x4}}, 0xa0) [ 188.813648] audit: type=1400 audit(1566815538.938:49): avc: denied { getrlimit } for pid=7564 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 10:32:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x101, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x40, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000540)={'veth1\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="4e8c561d3303000000e8058a"]}) getpeername$packet(r3, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000600)={'ipddp0\x00', {0x2, 0x4e21, @loopback}}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) socket(0x0, 0x6, 0x2000000000000000) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f00000000c0)={0x101ff, 0x1, 0x0, 0x2000, &(0x7f0000016000/0x2000)=nil}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000640)={{{@in, @in=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@empty}}, &(0x7f0000000200)=0x463) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000480)=[@text64={0x40, 0x0}], 0x1, 0x2, &(0x7f00000004c0)=[@cstype3={0x5, 0xb}], 0x1) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000580)=ANY=[@ANYBLOB="0900000000000000ff0f0000000000000300000000000000", @ANYRES32=r5, @ANYBLOB="000000001f00"/28, @ANYRES32=r0, @ANYBLOB="00000000000400000078c766fb99c7a27827a204b800000000001600", @ANYRES32=r5, @ANYBLOB="0000000001000100"/28]) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:19 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="e3e567f6a47fccb2275eba014ed1556f539d1a4dd97cda9eae60219ee865ea09ae7685ec2926d8b10c49553b900009e6ea8033bcb8ac08933b1236e2c7", 0x3d}, {&(0x7f00000013c0)="5b9c85847c8b256706329b94b68276777d3450c50bf054a9e5f48ebe856eefc909f46089acd37e52e258452473db9459968fb4e34e3bf23a4215831c3798d0a7f55db49718681829e1b44056640b5ee03290ae6a413a1344e47423", 0x5b}, {&(0x7f0000001540)="ee2252d8e335ef5629b4e32af5163b00683cb68c9bfec74a9ee3b5403999de137ef2178d1a3625f2bd0aad63261e01fc85f29f056c52cd9e6e0bbd04a812182aea31df8a1ed7a394c3fd512929b9597aaa2110029b86ee4aef6df96a0b726b400ca235fdd52a7701803bde42e53c6d37ae4479ef38d3467a9e54dda98f1aa2dd6f7ef1eb02bee994ab7a2703f283a3ade9f2d0c7500c459658dc091327ab0aa9b80f31b5907f0f7516e593b3eb4fb4f9e91b4b5669de88d29a7c3b558bfa981de6528465000000000000000000000000000023fb8a777b5a4fe80cae9d", 0xdd}], 0x3) write$cgroup_int(r0, 0x0, 0xffffff34) r1 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x7, 0x2000) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000280)) 10:32:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000300), 0xfffffffffffffd66) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) connect$tipc(r2, &(0x7f0000000180)=@name={0x1e, 0x2, 0x0, {{0x43}, 0x4}}, 0x10) clone(0x2902001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000400)=""/4096) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) getdents64(r5, &(0x7f0000001400)=""/235, 0xeb) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)={0x0, 0x3, 0x141}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ptrace(0x10, r6) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000001640)="a0090688721ae748a8fbb880ca0715c4ecd35ec88745b68b012c101909b1c21faa734d7ed892f39239da239696865037873f3d730159cdfad1378de5c615a0978df75a028e97f5d993236ce761102a81aa8e31d050e52c4122d55533832661edba725b6049fa63dae0660814ce9b8b1267b5cc82237403c48e39d15d9817dce3fdb12d65a6a5515884e43f") prlimit64(r6, 0x8, &(0x7f0000000240)={0x100000000, 0x63f9}, &(0x7f0000000280)) ptrace(0x4207, r6) fcntl$lock(r3, 0x7, &(0x7f0000000380)={0x0, 0x2, 0x7fff, 0x2, r6}) ioctl$RTC_PIE_OFF(r5, 0x7006) rt_tgsigqueueinfo(r6, r6, 0x27, &(0x7f0000000080)={0x31, 0x629, 0x800000000000400}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4, 0x2, 0x9, 0x4, 0x19, 0xde6, 0x0, 0x400, 0x4, 0xdb, 0x4, 0x5}) clone(0x2102001fb9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) 10:32:20 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket(0x3, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) r1 = open(0x0, 0x0, 0x40) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f0000000100)={0x0, {0x9, 0x9}}) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x5a) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x4924924924928ee, 0x80fe) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f0000000140)=0x1, 0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000000c0)={0x0, 0xe9, 0x3003}) 10:32:20 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000100)=0x1c, 0x80000) sendto(r0, &(0x7f0000000340)="fdee230e27282009f5546fde177672f60139dcd09988c3bdd6c6327c5e1336d76141718c789fd378c59e4f76c77a4c2d2e712b999b4387cabfd65ec9fb578fd4128fbcc19b1bbd6da2ed96eb7f7b59917f4dde79d4babd0cfbec63f481ea5e7be1e731d179d513c740ce8d74", 0x6c, 0x4000, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)=""/7, 0x7) 10:32:20 executing program 2: getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000340)=""/217, &(0x7f0000000200)=0xd9) r0 = socket$inet(0x10, 0x2, 0x2000000000002) r1 = socket$inet6(0xa, 0x4805, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000002c0)={'ah\x00'}, &(0x7f0000000440)=0x1e) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x14) setsockopt$inet6_udp_int(r1, 0x11, 0x0, &(0x7f0000000300)=0x1ff, 0x4) prctl$PR_SET_FPEXC(0xc, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'netdevsim0\x00', 0xf260}) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000180)) bind$inet(r2, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$sock_int(r2, 0x1, 0xd, &(0x7f0000000100), 0x4) shutdown(0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) socket$packet(0x11, 0x0, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000180), 0xffffffffffffff9a, 0x4007ffd, 0x0, 0xb4) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 10:32:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000300), 0xfffffffffffffd66) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) connect$tipc(r2, &(0x7f0000000180)=@name={0x1e, 0x2, 0x0, {{0x43}, 0x4}}, 0x10) clone(0x2902001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000400)=""/4096) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) getdents64(r5, &(0x7f0000001400)=""/235, 0xeb) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)={0x0, 0x3, 0x141}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ptrace(0x10, r6) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000001640)="a0090688721ae748a8fbb880ca0715c4ecd35ec88745b68b012c101909b1c21faa734d7ed892f39239da239696865037873f3d730159cdfad1378de5c615a0978df75a028e97f5d993236ce761102a81aa8e31d050e52c4122d55533832661edba725b6049fa63dae0660814ce9b8b1267b5cc82237403c48e39d15d9817dce3fdb12d65a6a5515884e43f") prlimit64(r6, 0x8, &(0x7f0000000240)={0x100000000, 0x63f9}, &(0x7f0000000280)) ptrace(0x4207, r6) fcntl$lock(r3, 0x7, &(0x7f0000000380)={0x0, 0x2, 0x7fff, 0x2, r6}) ioctl$RTC_PIE_OFF(r5, 0x7006) rt_tgsigqueueinfo(r6, r6, 0x27, &(0x7f0000000080)={0x31, 0x629, 0x800000000000400}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4, 0x2, 0x9, 0x4, 0x19, 0xde6, 0x0, 0x400, 0x4, 0xdb, 0x4, 0x5}) clone(0x2102001fb9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) [ 189.895466] overlayfs: unrecognized mount option "lowe " or missing value [ 189.902630] audit: type=1400 audit(1566815540.018:50): avc: denied { create } for pid=7597 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 189.971068] overlayfs: unrecognized mount option "lowe " or missing value 10:32:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r1, 0x1, 0x10, &(0x7f0000b56f40)=""/192, &(0x7f0000000040)=0xc0) 10:32:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000300), 0xfffffffffffffd66) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) r2 = socket(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r0) connect$tipc(r2, &(0x7f0000000180)=@name={0x1e, 0x2, 0x0, {{0x43}, 0x4}}, 0x10) clone(0x2902001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000400)=""/4096) rt_sigtimedwait(&(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) getdents64(r5, &(0x7f0000001400)=""/235, 0xeb) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)={0x0, 0x3, 0x141}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ptrace(0x10, r6) ioctl$PIO_FONTX(r5, 0x4b6c, &(0x7f0000001640)="a0090688721ae748a8fbb880ca0715c4ecd35ec88745b68b012c101909b1c21faa734d7ed892f39239da239696865037873f3d730159cdfad1378de5c615a0978df75a028e97f5d993236ce761102a81aa8e31d050e52c4122d55533832661edba725b6049fa63dae0660814ce9b8b1267b5cc82237403c48e39d15d9817dce3fdb12d65a6a5515884e43f") prlimit64(r6, 0x8, &(0x7f0000000240)={0x100000000, 0x63f9}, &(0x7f0000000280)) ptrace(0x4207, r6) fcntl$lock(r3, 0x7, &(0x7f0000000380)={0x0, 0x2, 0x7fff, 0x2, r6}) ioctl$RTC_PIE_OFF(r5, 0x7006) rt_tgsigqueueinfo(r6, r6, 0x27, &(0x7f0000000080)={0x31, 0x629, 0x800000000000400}) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4, 0x2, 0x9, 0x4, 0x19, 0xde6, 0x0, 0x400, 0x4, 0xdb, 0x4, 0x5}) clone(0x2102001fb9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, 0x0, 0x0) 10:32:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000080)={&(0x7f0000001400)={0x2, 0x2, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000000a}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}, 0x1, 0x2000000000000000}, 0x0) socket$key(0xf, 0x3, 0x2) 10:32:20 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000080)={0x0, 0x10001, 0x5, &(0x7f0000000040)=0x101}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000100)=""/119) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x1) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000001c0)={0xfd4, 0x6, 0x0, 0x5}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x200, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000002c0)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 10:32:20 executing program 2: r0 = socket(0x4, 0x1, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000040)=0x7, 0x4) sendmsg(r0, &(0x7f0000000080)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000d80)=""/4096, 0x1000}], 0x1, &(0x7f0000000480)=""/59, 0x3b}}], 0x1, 0x0, 0x0) 10:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000280)='./bus\x00', 0x12) r2 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000200)={r3, &(0x7f0000000140)=""/174}) io_setup(0x1, &(0x7f0000000080)=0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000000)) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r2, &(0x7f0000000100), 0x35a}]) 10:32:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x0, 0x3, 0x3}, 0x20) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) 10:32:20 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1c}}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) poll(&(0x7f0000000080)=[{r0, 0x2000}, {r0, 0x20}, {r0, 0x40}, {r0, 0x8000}], 0xc0e60d8667cf7e91, 0x0) 10:32:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='debugfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x3}, 0x8) lseek(r0, 0x0, 0x0) 10:32:20 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x80) r0 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f00000001c0)) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x101001, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x4d5, 0x400) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000200)="57297e308da8f5e09b80da448a1a2349", 0x10) getsockname$llc(r0, &(0x7f0000000240), &(0x7f0000000280)=0x10) r2 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\x01', @ifru_flags=0x6}) 10:32:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getpgid(0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0xb93) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="39000000130009006900000000000000ab00804813000000460001070000001419000a000f000000f00003f5000000000000ef38bf461e59d7", 0x39}], 0x1) r4 = semget(0x3, 0x7, 0x4) semctl$GETALL(r4, 0x0, 0xd, &(0x7f00000001c0)=""/57) getsockopt$nfc_llcp(r1, 0x118, 0x4, &(0x7f0000000180)=""/5, 0x5) 10:32:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x33) set_thread_area(&(0x7f00000000c0)={0x1, 0x20000800, 0xffffffffffffffff, 0x0, 0x8001, 0x0, 0x2, 0x9}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x10000) r2 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000004700)={0x0, 0x0}) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) recvmmsg(r0, &(0x7f0000004680)=[{{&(0x7f0000003d80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e00)=""/134, 0x86}, {&(0x7f0000003ec0)=""/1, 0x1}], 0x2, &(0x7f0000003f40)=""/248, 0xf8}, 0x20}, {{&(0x7f0000004040)=@x25, 0x80, &(0x7f0000004540)=[{&(0x7f00000040c0)=""/188, 0xbc}, {&(0x7f0000004180)=""/127, 0x7f}, {&(0x7f0000004200)=""/95, 0x5f}, {&(0x7f0000004280)=""/155, 0x9b}, {&(0x7f0000004340)=""/44, 0x2c}, {&(0x7f0000004380)=""/193, 0xc1}, {&(0x7f0000004480)=""/60, 0x3c}, {&(0x7f00000044c0)=""/96, 0x60}], 0x8, &(0x7f00000045c0)=""/142, 0x8e}, 0x8}], 0x2, 0x101, &(0x7f0000004740)={r3, r4+30000000}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000180)={r6, 0x38}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6, 0x0, 0xe0a, 0x0, r1, 0x0, [], r5, r2, 0x0, 0x3}, 0x3c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) 10:32:20 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x1ff) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141041, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="02"], 0x1) ftruncate(r2, 0x2007fff) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1400}]) 10:32:20 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r0 = inotify_init1(0x80000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200400, 0x8) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000280)=""/40) r2 = getuid() r3 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) r6 = getgid() r7 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast1}, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000b40)=0xe8) fstat(r0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = gettid() r11 = geteuid() lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000cc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) fstat(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000000f40)={&(0x7f0000000300)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4601101}, 0xc, &(0x7f0000000800)=[{&(0x7f0000000340)={0x1c4, 0x29, 0x800, 0x70bd2a, 0x25dfdbfc, "", [@generic="04fb", @generic="a1d3b8626e4e196d56a91cd6e28012df77bd550b52c8e4860f72c0b597027f6487b4483e9b0894dc4896d3c584fea05c4731b534ac16a127c5d7567e10e63248d4e995de51fa532603ee76df78007e1b73248ea1dd59bbd4", @typed={0x8, 0x4b, @ipv4=@empty}, @nested={0xc, 0x9, [@typed={0x8, 0x47, @uid=r2}]}, @typed={0x8, 0x6b, @ipv4=@multicast1}, @typed={0xc, 0x81, @u64=0x9}, @typed={0x8, 0x78, @uid=r3}, @nested={0x128, 0x80, [@typed={0x8, 0x2a, @fd=r0}, @typed={0x4, 0x95}, @generic="1c91e5ddaf25e2ad81b34243965b52b56404b11839638725d657dde7e26ed05e862358f01551be95ba173e2c10e7a6358270f6887011b553498fe7a1ef56a64f9bbfe96ca8f786e576313989058adc4461e0ae24379068bdfa481ffa96381f0e2b9eae35be793130b26e430684a60a3a0be382aaff91ced8f344082628fffa2623c065a222f0cb82f854330662e345322de109662ef43329f17467c6376db0efe9fed497c867d06e815b487d990bf111033130ad9aa0ae6327ffd38ed260", @generic="a1852a32d243877bbd314bfa4c896b3188914f01241643315c7e7f0644713bfab3f0fc65378f99a37495b6537159f6e715e532f5d18cc659788abd7d7e7c1c343d34a1fe53c3", @typed={0x8, 0x35, @fd=r0}, @typed={0x8, 0x78, @u32=0x8000800000000}, @typed={0x4, 0x58}]}]}, 0x1c4}, {&(0x7f0000000540)={0x2b8, 0x33, 0x20, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x2a0, 0x57, [@generic="09621b1a672fdbca9be4e21a926c70fff42fb23679a7445537f8fca5745b4ec269129d6b0d8ea6bda9e0d781cc404855e4f9beddac14a40568a71d0881db9928ec68d1325fa0838a253c117545086932bcd28a369475f8", @generic="5f694fd2091090bc341386ed4bc703731e9e4ec06f3089c27e779f600b78dba943b976cf4fa6c72a4b47dd923476082e7a25945ea4800c20e39d2d0fb8506736b9b58f558645178e51a85909", @typed={0x8, 0x79, @u32=0x100}, @generic="24a7cba03f78145968970e6b590f1bc3928ee0", @generic="d158", @typed={0xc, 0x7f, @u64=0xffffffff}, @generic="62f8f74397e08746e27f74da03acc4862ccf3f68debdb11aa5b625fc8c0daab825e3cc0d4391ecb7d3eec31608bced65b4d17f6ce1f403fe6b08f1e94a57e163ff10bc9c00346b88b691608b9a7ad251b9d2ee7d852f2ebb962aca5c28e9453b9f0d796cfd11ae5f2d037eb215222e76441593404fa7c2b6a5cf708d2863c8f5f2996132242d2e0e7d8f1cbd160f9437c76e1f6a70f6c79541f79292c8965988bca59b60c6ae9bcc74c6b1cb025509ab707e74be9b9ba5fd62a31609c56bb87ad0d2872be44f19ce062737eb9d03df238063ab8b39be7b784a", @typed={0x8, 0x4d, @ipv4=@dev={0xac, 0x14, 0x14, 0x22}}, @typed={0x8, 0x24, @ipv4=@multicast1}, @generic="a8d11254a981d79c2b9b661abaaa278bb18ab7544fec4a173258e00d28c9d659d2a9d9ec64c029420248037c9c7fbc04de72074596e17c54a691be86626750ae153e464d070046df5ef198cff6f71e36dc612c7aa6004e8e26c849fa13d6ad338b4c5e1ce8f592aed43b61e4d61fba061d7499590a0f006aeb1b6b2da88f02efa190c9f70a1f854990ac456f0aea8ca4d1373ce08d1d927b2b6b41a5885b262ab4f2eb6a7f802131a3d4fdc6271ad79e170e37dae8ad8f176669b93f662e56b9d4f6a14bf3eebedbddcf1ff749c1d8b772a8ac7f3b823e42b165487f9c789c793856fa40fb2ec0"]}, @generic="51f7533d319a"]}, 0x2b8}], 0x2, &(0x7f0000000ec0)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}], 0x80, 0x1}, 0x80) open_by_handle_at(r0, &(0x7f0000000080)={0xb3, 0xffff, "dff74ac57a0d1f3edd4b9a4c711121eb31794e66e1328de263407e53b0f0f64b5313df0f118f4200d92bf0951a035b8d9bc7881913cc301d83cdae444e95d43a0cc5f1b7b947f414419bf4bfde03e0c024058d7543cd0aa41aa0b5a87312c2bed4beddb06480446215f26d83d2c271d0a4e588358c9ce06bd352c11b5ca10646878d16500841814f5136fa42b3735d7b36f0ae1d5c1c9dc33fe1113988aa083db5455b9cea11ea856410fa"}, 0x4000) r16 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r17, 0x1, &(0x7f00000002c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r16, 0x0}]) 10:32:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x33) set_thread_area(&(0x7f00000000c0)={0x1, 0x20000800, 0xffffffffffffffff, 0x0, 0x8001, 0x0, 0x2, 0x9}) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x10000) r2 = dup2(r0, r0) clock_gettime(0x0, &(0x7f0000004700)={0x0, 0x0}) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x80000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) recvmmsg(r0, &(0x7f0000004680)=[{{&(0x7f0000003d80)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e00)=""/134, 0x86}, {&(0x7f0000003ec0)=""/1, 0x1}], 0x2, &(0x7f0000003f40)=""/248, 0xf8}, 0x20}, {{&(0x7f0000004040)=@x25, 0x80, &(0x7f0000004540)=[{&(0x7f00000040c0)=""/188, 0xbc}, {&(0x7f0000004180)=""/127, 0x7f}, {&(0x7f0000004200)=""/95, 0x5f}, {&(0x7f0000004280)=""/155, 0x9b}, {&(0x7f0000004340)=""/44, 0x2c}, {&(0x7f0000004380)=""/193, 0xc1}, {&(0x7f0000004480)=""/60, 0x3c}, {&(0x7f00000044c0)=""/96, 0x60}], 0x8, &(0x7f00000045c0)=""/142, 0x8e}, 0x8}], 0x2, 0x101, &(0x7f0000004740)={r3, r4+30000000}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000180)={r6, 0x38}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6, 0x0, 0xe0a, 0x0, r1, 0x0, [], r5, r2, 0x0, 0x3}, 0x3c) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x28) 10:32:20 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000200)='\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x313, 0x3}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xff7ffffffffffffc, 0x0) pipe2(0x0, 0x800) syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x401, 0x8000) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x24800, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000380)={0x8b, 0x5e378fc0253095a1, 0x1, 0x1, 0x3, @discrete={0xd5, 0x8}}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) prctl$PR_GET_FP_MODE(0x2e) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000240)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f00000001c0)={{0x1, 0x2000000, 0xfffffffffffffffd, 0x3, 0x1}}) write$P9_RLOCK(r5, &(0x7f0000000080)={0x8, 0x35, 0x2, 0x3}, 0x8) sendmsg$IPVS_CMD_ZERO(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00072abd7000ffdbdf25891e966ce411100000001c000300080008000400000008000400810000000800030001000000d369099fb20b71cd5f8f0585ed675edb0f8f22c27b0360874540fa4b3e0aafdbac9428ebc744dd7c433c47a805d4276e2678ed5874b07a88d90b440c715cdc9c63ff46283c0ad6767cbf921f662f968c900beedc3662829cb715fd21b80b7e6ecb4a2a586b8b8bbe25810f25addefdbadb3e79e98fe4de48a6e0e7a97875f34d0de8a857c751081b88f3268cc1daf53b292ab5aae7a58d73e3f193635c3592dbaeae7f5748dadc200a2e2d3a35b7ac185f6fd0f19268a0cce4ceadb1220b1e268eb5d029299f10"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x4000) getuid() ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'dummy0\x00', r2}) 10:32:20 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = dup2(r0, r0) write$apparmor_current(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) sendto$inet(r0, &(0x7f00000012c0)=' ', 0x1, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 190.461933] bond0: caif0 ether type (0) is different from other slaves (1), can not enslave it [ 190.498829] bond0: caif0 ether type (0) is different from other slaves (1), can not enslave it 10:32:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000940)={0x8, 0xb, 0x4, 0x10, {r4, r5/1000+10000}, {0x7, 0x0, 0x2, 0x0, 0x8000, 0x5, "28a2af5c"}, 0x100, 0x4, @planes=&(0x7f0000000900)={0x8, 0x5, @mem_offset=0x1, 0x3}, 0x4}) r6 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000700)=0xe8) getgroups(0x5, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0xee00]) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000840)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}, {0x2, 0x0, r3}, {0x2, 0x2, r6}, {0x2, 0xabe2bc2b69b503df, r7}, {0x2, 0x6, r8}, {0x2, 0x1, r9}, {0x2, 0x4, r10}, {0x2, 0x5, r11}], {0x4, 0x7}, [{0x8, 0x5, r12}, {0x8, 0x4, r13}], {0x10, 0x1}, {0x20, 0x5}}, 0x7c, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x1) 10:32:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 10:32:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x8000) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x313, 0x13e5, 0x4e5, 0x0, 0x9, @link_local}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10200, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21000001}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@getnetconf={0x14, 0x52, 0x800, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8804}, 0x48011) recvmmsg(r3, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 10:32:20 executing program 3: r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x8, 0xbc64, 0xfffffffffffffe00, 0x400, 0x3, 0x6}, 0x6}, 0xa) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000100)) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0xc008af12, &(0x7f0000000080)) [ 190.636732] sctp: [Deprecated]: syz-executor.2 (pid 7706) Use of int in maxseg socket option. [ 190.636732] Use struct sctp_assoc_value instead [ 190.653917] sctp: [Deprecated]: syz-executor.2 (pid 7707) Use of int in maxseg socket option. [ 190.653917] Use struct sctp_assoc_value instead 10:32:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xc0880, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0x400) recvfrom$rose(r1, &(0x7f0000000340)=""/175, 0xaf, 0x100, &(0x7f0000000200)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x40) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$RTC_UIE_OFF(r3, 0x7004) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000001c0)=r2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40605346, &(0x7f0000000100)={0x0, 0x0, 0x2, 'queue0\x03\xe8\x00'}) ioctl$TIOCSCTTY(r3, 0x540e, 0x9) 10:32:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f00007e0000)=""/4, &(0x7f00000001c0)=0x283) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) 10:32:20 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/dev/nbd#\x00', 0xa, 0x62465aaab8eb40b2) r1 = syz_open_dev$ndb(0x0, 0x0, 0x100) r2 = dup3(r0, r1, 0x80000) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x800, 0x1, 0x7}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='x \x00\x00c/sys/net/ipv4Bvs/nat_icmp_send\x00|\xfa\x11\xf66}\xb8\xba\xa5\x19\xb0\xdb\x0f\x1a6S\x88\xa0*7\xea\xe7\x8bs@\xcc\x14\x8d(\xe2\x95\xba\x06\xca)\xc1.\x86\x06\xc8]C\'B#]\f\xd6J\xfa1r\t\f\x8c', 0x2, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000180)={0x1, 0x0, [], {0x0, @reserved}}) getsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000240), &(0x7f0000000280)=0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f00000002c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) 10:32:20 executing program 3: unshare(0x8000400) mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x440, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) r2 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$FUSE_STATFS(r2, &(0x7f0000000000)={0x60, 0x0, 0x5, {{0x8, 0x6, 0x0, 0x7, 0x8001, 0x80, 0x400, 0xfffffffffffffff8}}}, 0x60) splice(r0, 0x0, r2, 0x0, 0xffffffff, 0x0) 10:32:20 executing program 5: r0 = timerfd_create(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) accept$unix(r1, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") timerfd_settime(r0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) 10:32:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x80, 0x20) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x424001, 0x0) getsockopt(r0, 0xf6c8, 0x1f, &(0x7f0000000040)=""/59, &(0x7f0000000100)=0x3b) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000005c0)=""/4096, 0x1000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x723, 0x7fffffff, 0x1, 0x4, 0x9, 0x9, 0x4, 0x400, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0x8) 10:32:21 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={0x0, 0xfffffffffffffff7, 0x6, 0x8, 0x4}, 0x14) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000100)) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000240)={0x79}) 10:32:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000100)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f00000001c0)) pkey_alloc(0x0, 0x1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000640)={0x4, 0xcd}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) setresuid(r2, r3, r4) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) 10:32:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) sendfile(r0, r1, 0x0, 0x1) 10:32:21 executing program 3: mlockall(0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='numa_maps\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r2 = socket$inet(0x2, 0x3, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f0000000140)={0x100, 0xe0}) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2, 0x11, r3, 0x0) getsockopt(r2, 0x0, 0xd0, &(0x7f0000001400)=""/203, &(0x7f0000000040)=0xcb) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) r4 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x7, 0x400000) write$P9_RREAD(r3, &(0x7f0000000200)={0x77, 0x75, 0x2, {0x6c, "620b24f1541f022f92c970162cec9f9762114f7810255f1ef1d75373bf72ed8383c038231399ad7b6aa671c347562b9158a99bb003316dc9b0fc40b6ceecb7abe3647e26cc36ba242eafef99bd585f198724bb4d52a6bf5079ddf855fc4af6d103032146f5509e709c123845"}}, 0x77) ioctl$UFFDIO_ZEROPAGE(r4, 0xc020aa04, &(0x7f0000000100)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x1}) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0) 10:32:21 executing program 5: add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x4, 0x3}, {0x8799, 0x4}, 0xffffffff7fffffff, 0x3, 0x20}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x9f', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu//y\xf3l\x00@\x05:$\x92\t71\xf7|6\xaf@W\xda\xea\xf2\x897~', 0x1ff) r3 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f00000002c0)=r4, 0x12) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffff59) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f0000000300)='io.max\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb5015d95b9edd175) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 10:32:21 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000800)='/dev/amidi#\x00', 0x7fffffff, 0xf02c2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000340)={'nr0\x00', 0xdc3}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0x27}, @mcast1, @ipv4={[], [], @loopback}, 0x8, 0xa31, 0xff, 0x400, 0xcf2e, 0x2, r1}) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = socket$unix(0x1, 0x2, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000380)=0x1, 0x4) connect(r3, &(0x7f0000931ff4)=@can={0x1d, r1}, 0x80) socket$kcm(0x2, 0x9c6ffd96d462113d, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2, 0xfb, &(0x7f0000000080)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r4 = socket$kcm(0xa, 0x1, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0}, 0x200008c4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) recvmsg$kcm(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, &(0x7f00000002c0), 0x4) r6 = gettid() perf_event_open(&(0x7f00000008c0)={0x7, 0x70, 0x207a, 0x1, 0x1, 0x7, 0x0, 0x2, 0x400, 0x2, 0x2, 0xc6, 0x3, 0x10001, 0x8b4, 0x7, 0x4, 0x5fb9, 0x3, 0x6, 0x17ee, 0x2, 0x7, 0xa5, 0x20, 0x0, 0x6, 0x7, 0x1, 0x100, 0xfff, 0x4, 0xfffffffffffffff7, 0x0, 0xffff, 0x369a, 0x97b8, 0x7, 0x0, 0xd337, 0x4, @perf_bp={&(0x7f0000000880), 0xb}, 0x31000, 0xffffffff, 0x45, 0x0, 0x7fff, 0x98}, r6, 0x2, r5, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd'}, 0x48) r7 = socket$kcm(0x2, 0x5, 0x0) r8 = getpid() perf_event_open(&(0x7f0000000740)={0x1, 0x70, 0x4, 0x8, 0x2, 0xffffffffffffff31, 0x0, 0x80000001, 0x0, 0x9, 0x9b9c, 0x401, 0x4f, 0xfffffffffffffffe, 0x4, 0x9, 0x13fd, 0x10000, 0x0, 0x5, 0x10001, 0x7fff, 0x1000, 0x52, 0x1, 0xffff, 0x5, 0x0, 0x9, 0xe3, 0x4, 0x6, 0x1, 0x8, 0x0, 0xf80000, 0xffffffff, 0x3ff, 0x0, 0xffff, 0x5, @perf_bp={&(0x7f0000000700), 0x4}, 0x20, 0xffffffff80000000, 0x2, 0x8, 0x0, 0x4, 0x3}, r8, 0x7, r5, 0xa) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x890b, &(0x7f0000000000)) socket$kcm(0x29, 0x7, 0x0) recvmsg(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/76, 0x4c}, {&(0x7f0000000300)=""/148, 0x94}, {&(0x7f0000000240)=""/15, 0xf}, {&(0x7f00000003c0)=""/141, 0x8d}, {&(0x7f0000000480)=""/151, 0x97}, {&(0x7f0000000540)=""/109, 0x6d}], 0x6, &(0x7f0000000680)=""/48, 0x30}, 0x1) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000980)='./cgpoup.net/syz0]\x00', 0x200002, 0x0) 10:32:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000280)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f00000002c0)="eb58906d6b66732e66617400020120000200068000f8", 0x16}], 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) 10:32:21 executing program 1: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f0000001880)=[{&(0x7f00000002c0)="81235bc2568fb1080a84acc0e0faba7e5b27a5ae76309fc70e398571577274a7894a8e8c0c0f8479089ebfb39f74cd8f38c60870e3d6895eec2930012a9092de8a69786e41ecef9a606eab2453675adb9eec00743eff48fb65783df4e1dfbe5a8f8334a5a1f4c8fe56db58ea3c0748682af9833e5a3ae5d77ac56a077d37499fd1802e1963e16fc0771b3c1cd9cc81eff61be606622b12d6a5c24ba416e50662980dda5f9b0f97a73350804a6bda2eb93ffe2a4a5c111257c02493b31b110991aefe07932ec9ac910bc1e1cb30fb3be5a47a7b1be590350bed174096d75fbd8715f7c3e78152a9d3dda3b123236522328342dc03bf95", 0xf6, 0x101}, {&(0x7f00000003c0)="aa50dc97dbb71436e2854acdb2f9a54a61a283b01dc3a6f21de1ec893b085c3ee276a3c833176a82d99f6cdcba5cea1e5704bb0e1196b826f344c3f6db9481cd0657a4773daed0a8d4f7bfc3490da3d03cb052c09b07ad4609ce70ff5d9d96a7b7c68605ad1d1ba229ebca3c9a8b6525a152e079a02444cfa8af67ca2a55b9751974b69aa7e741355631b156f989f172f6b333b8b3ddc9972c77ac35168a29497c01ed5164bf1cd12b8681d166db696da68ccff7c1ea0f4f64bcc17963e026322d649b2db150246e567e0248f0bff25b04c220071320d3283fa6b772931cba76dfcc06", 0xe3, 0x6}, {&(0x7f00000004c0)="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", 0xfa, 0x1}, {&(0x7f00000005c0)="d44c609daa6dfab30d286ec8693a09464362a868262114a301e351095072f7d04267e035e30e2b1c214bc94955bc5ae5ec91a470a3e46938d49d0e7cb962e6aee09fcf6b315dcd97cff2516a41a55be4251a7e3204e40b109a5337d85699f6a45755f4622400f826490b40359e625eb81fb202fe66a825662c3aca6a51d3327033730a24a83bd61029d9be1dd6973c17b6393c963b8ba6a7a04be66095821d3f2b977d2b571169f9f1023dd69c029c3d4aafeb6c2aa05257bad54f264597e142abc0245a58814f21c7aaa6e6d732679a816e1f259ccb6e6eaf7fab06310201df5e00", 0xe2, 0xffffffffffff0001}, {&(0x7f0000000080)="5bbd0e0a3f016ee0420312c28fc1c9228c2d9b73e294b69aff45613ca517348bbc0b4c90f95e76a919ac5a4c17cc453ff4efbbdaac1ecc150fb3f10b64ecf2a16d0c337033238e126348aa58ce726f38a0d3bea2d6ac8300746604714bf47037bb601a5942fc59454afd6393d98685e5b23b44a7a787de0738ce8653520cfc757fa591f1aa", 0x85, 0x1}, {&(0x7f00000006c0)="dd7f083c6bf09bd44c86c4386998e994aafc62218f1fe8a14462bfc377c3efe3d15f0f766179267e372ab60bab873e788ccfcea2b288b650ce6c89fbe2a157b5a4e931d1250f020bc5656b44b4f8f1d50ded459c0fe9185ca88507bdadb78d6438f2635c3665ac987ad9c635287b38a2e98e3b8eb894733c736a00261926f6482811429b5ea22c2975de25b78e228039400d3369440c904ef46caf87976071033644e49883572f1d1977437b9182aebcdc7bd45d7697b4318df2b89012387466a41aa00047ad21df269e4c1c6f8a3084e0baa86b22bcbdc967feb4152df8573edc408404d81642ee", 0xe8, 0x2}, {&(0x7f00000007c0)="71bc474fee1fbb81870a4fef05284c728837a3154de77776d4598b9461d2bb33fa33a6c95df9c6d58766f1f6671dd3d1bd32b9791c8375cec84113cef021445abfd522ca501cbc5d4b99b65cbbf0b698d9cbc3a7243ca82c0da5c3cfaefcdac7a0c0e41ecf3484c821bdc864d2ecda5e1e0fd758966f425a4bd0b2a9aff983c8b73df60f39f4737d62d1b76f01c0cf23d8eed0eed110d5d39fd4f19658388320e84b65e8df9dfadf77d9604b4f58e079", 0xb0, 0x3ff}, {&(0x7f0000000180)="0f18c70808e68139addc2bbbcaeaf2b08c399ddf4600f05d3c8782056078771232a65df3a6efdbd60081a0fbbd55b860e1957e8e20824dbf46a9dc", 0x3b, 0x2}, {&(0x7f0000000880)="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", 0x1000, 0x3f}], 0x80000, 0x0) 10:32:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000033c0)=0x14) connect$can_bcm(r2, &(0x7f0000003400)={0x1d, r3}, 0x10) 10:32:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000100)={0x3, @default, r2}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1, 0xb000}, 0x4) 10:32:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r1, 0x20, 0x400000000000000, 0x400000369e5d84) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) open$dir(0x0, 0x0, 0x0) 10:32:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(0x0, r1, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) 10:32:21 executing program 5: add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x4, 0x3}, {0x8799, 0x4}, 0xffffffff7fffffff, 0x3, 0x20}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x9f', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu//y\xf3l\x00@\x05:$\x92\t71\xf7|6\xaf@W\xda\xea\xf2\x897~', 0x1ff) r3 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f00000002c0)=r4, 0x12) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffff59) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f0000000300)='io.max\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb5015d95b9edd175) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 10:32:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000033c0)=0x14) connect$can_bcm(r2, &(0x7f0000003400)={0x1d, r3}, 0x10) 10:32:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x1800000000000060, 0x10000051b, 0x0, &(0x7f0000000100)="221c63d00ae4c9c4a72ebaf35f1cdd", 0x0, 0x9, 0xf2ffffff}, 0x28) [ 191.521610] audit: type=1804 audit(1566815541.648:51): pid=7789 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir889473559/syzkaller.ZFclYk/22/file0/file0" dev="loop4" ino=5 res=1 [ 191.659514] audit: type=1804 audit(1566815541.648:52): pid=7801 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.4" name="/root/syzkaller-testdir889473559/syzkaller.ZFclYk/22/file0/file0" dev="loop4" ino=5 res=1 10:32:22 executing program 3: syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/dev_mcast\x00') r0 = accept(0xffffffffffffffff, &(0x7f0000000340)=@nl=@unspec, &(0x7f0000000280)=0x80) accept$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e", 0x61, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 10:32:22 executing program 2: chroot(&(0x7f0000000000)='./file0\x00') r0 = getpgid(0xffffffffffffffff) r1 = getpid() setpgid(r0, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$nfc_llcp(r2, &(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "42ba6a73aae01cbe8ac247227aee85a3b3289d03f953ae183cdcbf829069d31ae29d787551a3eaf98ca10942efe593f1066b7f12dd03fcdc7ec40e3eaf2286"}, 0x60) 10:32:22 executing program 5: add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x4, 0x3}, {0x8799, 0x4}, 0xffffffff7fffffff, 0x3, 0x20}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x9f', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu//y\xf3l\x00@\x05:$\x92\t71\xf7|6\xaf@W\xda\xea\xf2\x897~', 0x1ff) r3 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f00000002c0)=r4, 0x12) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffff59) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f0000000300)='io.max\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb5015d95b9edd175) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 10:32:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) shmctl$SHM_LOCK(r0, 0xb) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setresuid(0x0, r1, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1a55a97b6a24d51bd5a6002dc50c00030000ff7fff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) accept4$llc(r1, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x10, 0x800) bind$packet(r1, &(0x7f0000000080)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 10:32:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)=':posix_acl_accessGPL\x00') geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)={0x0, @aes256}) creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$ax25(r2, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default]}, 0x48) 10:32:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000240)="7d0000001200192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f640094750a0e2900050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000", 0x1e7}], 0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000600)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000840)=0xe8) r10 = getgid() fstat(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000009c0)=[0xffffffffffffffff, 0xee00]) fstat(r3, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00)=0x0, &(0x7f0000000c40)) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000c80)={{}, {0x1, 0x4}, [{0x2, 0x3, r4}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x6, r7}, {0x2, 0x2, r8}, {0x2, 0x1, r9}], {0x4, 0x1}, [{0x8, 0x4, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x4, r13}, {0x8, 0x2, r14}, {0x8, 0x4, r15}, {0x8, 0x1, r16}, {0x8, 0x3, r17}], {0x10, 0x1}}, 0x94, 0x3) [ 192.263215] tpacket_rcv: packet too big, clamped from 28 to 4294967280. macoff=96 [ 192.301194] SELinux: duplicate or incompatible mount options 10:32:22 executing program 5: add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0x4, 0x3}, {0x8799, 0x4}, 0xffffffff7fffffff, 0x3, 0x20}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x9f', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu//y\xf3l\x00@\x05:$\x92\t71\xf7|6\xaf@W\xda\xea\xf2\x897~', 0x1ff) r3 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r4 = getpid() write$cgroup_pid(r3, &(0x7f00000002c0)=r4, 0x12) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x4, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xffffffffffffff59) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_int(r1, &(0x7f0000000300)='io.max\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, 0x0, 0xb5015d95b9edd175) gettid() bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904024865160b00010010000000000000140e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) 10:32:22 executing program 0: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:22 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000000000bd82bbe6000000040000000080000000008000ffffffff7c0000007d5759ec47d6f86ce05be5f0f6434fec439efc436b65d8410000000002056b376bf703f4986f5e0000659510ebb1b016b08fb6c92fa464f1d58668036b8713f8243aa410b80952a19fbcc1f99ddbdd680f0495d8b2834615a13c518f776c0010000000060000000000000000000000000000000800000a0000000000000000000000060028855f5db8f52d79a47c046f2885f51d2c2cbcdae0186b5e8e1a06685c3d2102e1cde3c9ef77a47372a4e4f5c90d60acd02fa6b00eadf95d746355a9c00d200678e189b1a09c7a0be124e184fdfc5d5adc674ed31dc948041b8c671e8338c54244338d822fd6a3301615e4cb5d7e003ce736be085a00f6e7ac4cbf3cef78d06acd00afff9ef880d8810e42e2b709cbd8d86bde774ca793657d4398e4b7809f43950684499257b110eb05090c7f8ce0d4b022f3ff337b53894f0000000000000000000000000000c2f75b5477f2110a2cc36c3d078ce4932f9612d56dac58875163461753f070e65435b7137c9474a3f90bce823a4f625c7cb73fbb1d098dedfdd1f4fb4daca37fb3016d11303e723ad3d2b8a3f8c7e15cbb8de2469cc1fca9422e5247b3d0f1215587b33cd02c091fe842b22d9a409ce439b385c7f9a562a120dcbc8d9c58e26f291a5662bca9b3891a58139b30d75c000000000000000000"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:22 executing program 1: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000640)={0x53, 0xffffffffffffffff, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000580)="9f2bf1055a954413e117d69d2b6e17569c220101cef544d9e44bfe4f271500d3ba", 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400000) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 10:32:22 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x338, &(0x7f000000cf3d)=""/195}, 0x48) fstatfs(r0, &(0x7f0000000480)=""/227) [ 192.533351] sd 0:0:1:0: [sg0] tag#4538 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 192.542299] sd 0:0:1:0: [sg0] tag#4538 CDB: Service action out(16), sa=0xb [ 192.549335] sd 0:0:1:0: [sg0] tag#4538 CDB[00]: 9f 2b f1 05 5a 95 44 13 e1 17 d6 9d 2b 6e 17 56 [ 192.558356] sd 0:0:1:0: [sg0] tag#4538 CDB[10]: 9c 22 01 01 ce f5 44 d9 e4 4b fe 4f 27 15 00 d3 [ 192.567238] sd 0:0:1:0: [sg0] tag#4538 CDB[20]: ba 10:32:22 executing program 5: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x101000) capset(0x0, &(0x7f0000000100)={0x3, 0x0, 0x0, 0x0, 0x5}) socket$caif_seqpacket(0x25, 0x5, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/user\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000140)=0xa44b) sendmmsg(r1, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0xa241c3b208b30be8, &(0x7f0000000080)=0xcc, 0x4) 10:32:22 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000380)='/dev/video#\x00', 0x3, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000040)=0xa2, 0x7, 0x4) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) write$P9_RLOPEN(r1, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0xc1aad4313389a78e, 0x0, 0x8}, 0xaf8}}, 0x18) ioctl$VIDIOC_OVERLAY(r0, 0x8030560a, &(0x7f0000000000)) [ 192.638276] SELinux: duplicate or incompatible mount options [ 192.667699] SELinux: duplicate or incompatible mount options 10:32:22 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:22 executing program 1: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40401, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4e22, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc47d}, 0x1c) r2 = request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/sequencer2\x00', 0xffffffffffffffff) keyctl$revoke(0x3, r2) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x1800}, 0x0, 0x0, 0x1, 0x1}, {{@in, 0x0, 0x32}, 0xa, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35d}}, 0xe8) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000002c0)={0x101, 0x6}) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) 10:32:22 executing program 0: epoll_pwait(0xffffffffffffffff, 0xfffffffffffffffe, 0x101, 0x0, 0x0, 0xfffffffffffffe46) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1', "f246b551ed0325475a796e3dd5dffaefd597cbed7acb53011f76075f0beea225e92ec180"}, 0x28) 10:32:22 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000001a40), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="0002000000000000040100c910ff010000ddffffffffffffff000000010000003cb68922d38bebd84c95da9e5b4afecf0f14e1c91e0826d5309c522040c5839ac9a7575ba5132287032a5c94066446bf8dba0fb5560eba42a6a5048fca35a01c2078a777a850f4b562b476ab"], 0x20) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x108}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004840}, 0x1) 10:32:22 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:audit_spool_t:s0\x00', 0x23, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xffffffea) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-ssse3\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) [ 192.889218] audit: type=1400 audit(1566815542.998:53): avc: denied { relabelfrom } for pid=7883 comm="syz-executor.2" name="" dev="pipefs" ino=28251 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 10:32:23 executing program 1: r0 = syz_open_procfs(0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000400, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x40000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000000c0)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000600)=""/87) r2 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000840)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000500)=0xe) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000580)={r3, 0x8}, &(0x7f00000005c0)=0x8) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) clock_gettime(0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000200)='user\x00', &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b40)=""/39, 0x27}], 0x1}}], 0x1, 0x100, &(0x7f00000032c0)) request_key(&(0x7f0000000300)='user\x00,\x93\'9\xe5\\u\x9b\x95\xb6-\x14\x0e\b\'\xb9\v0B0\xcb\xd0\xfa\xd1 \x9c\xcdP\x1e1\xbdu\xaa\xf5\xc2\x14\xca\x10\x91>\xf5\x8c\x9d\x15\x16\xa8\xbb\xc3\xea\x02\xb9\x04\x10w\x91J5\xd8\x177C\"\xd8\x10tf5\xcc:\xdf\xd3\xab\xd2\x88\xa9\xd9\xccw\xeb?\x05%\x82\xd8\xa7+smGH\x82`w\x1d\x8f\xc9\xa3\xf3\xf4\xa9{\xff\xe2\x90DY\x9d\"s\x10\xb6\xc5v6\xeb\x86\xa7\xb8\xa4\xaa%\xccA\x83`\x10,\xf9\a\a5\xaa\x1e-', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000003c0)='t\xcea\xdaU@t\xc7I\xe2U\x9cz\x13*\x04\xc6n\xf4\x8e\xf4\xb8U\x1e\xd3\\\x1e\x8c!\xcc\xa9\x84r\x94Np\xe27A\x83\xbf[\xcd\xae%\x9a\x10f\xb6\xd5b\xd6O\b\x93\xf4\xe0\x8d\xf5\"y\xbc\xa4\xb3\xe0\x1e\xfb|r6\xdd\x9b\xab+~\xe6\x80{\xb1\xe6G{\x19\"\xc3\x94/\x01l(\xff_\xad|Wh*\x85\xa0\x19\xbd\xeeRIh\xf7\x9a^\xe4\x99\xe2\v!\xe5|\xc9\xe7\x19?rj\x8a\xffW\xb2\xe8\x0f\xb7\x1d\xafe\xa8\x97v\xf7/,\x9eI\xcd\xa1\r\x80\x80\xd4Mrz\xcct#\x04\x99\xfd\x1e`\x02@\x94\xac\x98]z4%\f\"ub\xfb\xd5\xd6\xe4\xe8b\xce\xe3\x1e\xe2\xd2\xb7r\xf9\xeb\x066\x1a\xbc\xe8z`t\xa9j>c\x9a!\xc7`\x93\x94', 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r4 = syz_open_procfs(0x0, &(0x7f0000000540)='net/snmp\x00') preadv(r4, &(0x7f00000017c0), 0x199, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000080)={0x40, 0x1, 0x80000001}) getuid() 10:32:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000100)) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000000c0)) setsockopt(r0, 0xff, 0x1, &(0x7f0000000080)="18", 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x82400, 0x0) ioctl$TIOCNXCL(r2, 0x540d) 10:32:23 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000000000bd82bbe6000000040000000080000000008000ffffffff7c0000007d5759ec47d6f86ce05be5f0f6434fec439efc436b65d8410000000002056b376bf703f4986f5e0000659510ebb1b016b08fb6c92fa464f1d58668036b8713f8243aa410b80952a19fbcc1f99ddbdd680f0495d8b2834615a13c518f776c0010000000060000000000000000000000000000000800000a0000000000000000000000060028855f5db8f52d79a47c046f2885f51d2c2cbcdae0186b5e8e1a06685c3d2102e1cde3c9ef77a47372a4e4f5c90d60acd02fa6b00eadf95d746355a9c00d200678e189b1a09c7a0be124e184fdfc5d5adc674ed31dc948041b8c671e8338c54244338d822fd6a3301615e4cb5d7e003ce736be085a00f6e7ac4cbf3cef78d06acd00afff9ef880d8810e42e2b709cbd8d86bde774ca793657d4398e4b7809f43950684499257b110eb05090c7f8ce0d4b022f3ff337b53894f0000000000000000000000000000c2f75b5477f2110a2cc36c3d078ce4932f9612d56dac58875163461753f070e65435b7137c9474a3f90bce823a4f625c7cb73fbb1d098dedfdd1f4fb4daca37fb3016d11303e723ad3d2b8a3f8c7e15cbb8de2469cc1fca9422e5247b3d0f1215587b33cd02c091fe842b22d9a409ce439b385c7f9a562a120dcbc8d9c58e26f291a5662bca9b3891a58139b30d75c000000000000000000"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x8, 0x202, 0x8, 0x1, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={r3, 0xd8, "2eac7b367cb2c8cacc26599e95f2bc1d01ebbfeae280b01048201d4f62ed57c14d75503909e92810a35f70a8bc17c7a2d72cd4ecbfa0040ffc4b04cda0d4c1c2bf95aa79fad47aea7aa15ae87a7f45947b01abde90e94e35237a3ab6e4bb64d8f778df76c45e39012686b5e9c7329d76a078821ff5edca0a09dd3865022c37c36fce645e3aa5e2a84611ec384dc05030d7bb0f866e714f72fcfb1c7f87a3d95ba7d39bc245ddadeba0cc833d485d3dd09fd9a073840308de608976059154c8c33d20b7507a4c38752653420362bd485186eed43bcce0fef8"}, &(0x7f0000000200)=0xe0) 10:32:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002880)='pids.ev\xe4\xba\x8ej\x89\xd5%\x02\x1fGtd\xf6u \x00Hz\xcfM?\",\x05\xbe\x10\xf5\x8c13(}L&\xbeL\xecY.\xd5M\t\xbc\xa3T(\x98\x8b\xcf\xaf$1\xa8\xff\xea\xb9\x9b\xeb\x15S\xac&O\x06w\xb21\xf6\xa7\x9a\'gK\x8f\xa2y\xea\xefx\x11\x80y\x8d\xa6O\xd1\x8b\x89\xe0\xdd\x1a\x99 \v\x19\x14\x88|i\x8c\x03\x13wv\xf2\x1e\xbd\xcf\xbf\x95\x86S;0;a\a\xb5\xeb\x8bE7\xaf\xb0\x95xc\xe8\x91m\x9d}\xbb\xdf\xdfbF?6\xc8%\x00I.t\xdcI\xd8O.\x8cK\x86\xa1\xba\x00~\xa2\xe6\xba\x02Pg\x9e\xee\t\x1eewr3\xcf\xc8g\x924\x05\xc3\xca\xc5@\x04\n?Vw\x18#Ui\x94\x93H\xbf\x1b\x9f\xfa\xc4\x8f\x93[\x99\xe2j\xea\xc2\x00\x1e\xbe\b\xf7\x12\xe6LX\xfdW\x91[\x8e\x1b\xe8u\xbbKn\xef\xe7%\x00\x80\xaeI\xa7\x89\'(\x06\xdd\xaa', 0x0, 0x0) setsockopt$TIPC_GROUP_LEAVE(0xffffffffffffffff, 0x10f, 0x88) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) sendmsg(r1, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x1118}, 0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, 0x0, 0x20000102000007) 10:32:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x16) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0xdb2e}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) 10:32:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f0000000040)=""/93, &(0x7f00000000c0)=0x5d) r2 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b23, &(0x7f0000001fc0)='wlan1\x00\a\xd3~\xd4\xa2\xb8\x01\x80\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\xff\x8d\x00\x00\xf6\xe7\xf9\x01\x06\x8c\xe2K\x04\xd9\xfd\xbd\x00\x1d})\xa0\xb1\xd2\xe4\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00s\x18\x9f \xfa\x9d\x1b\x01U\xbe\x01\x01X\xbdh\xbfjOc\xcd\x15\xc1K\xab\xe9\xe3\xe8\x05\xda\xce\xed\xa5\xb8<\x9d\xd1\x19EI\x952\x12,\xec\x02:a\xad\xef,\xbc (\x02B-mF\xfa\x92\xdc\x13\x06\x1fkb\x91z\x8eKi)\xb5i\x0f\xc7\v\x9d\x81\xb3r\xb1x\\\xdb\xcbzE\xfeO\xe7\xdf\x96\xa2\xf8EX\xe3\xbcf\x02\x98T\x1a\x1f\x16\xb9\b\xa2\xb0\xb1\xc4vCh>\xa3\xd7\xc70\x92C5\x9d\x17\xd1\x96g\x8d\xd1\x06i\xde<\xf3\xd9\x93M/\x1eQ\xba\xe7[\xe3\x00\x00\x00\x00\x00\x00t\xeeKr\xb3\"\xa9\xef\xa2\xd8\x03_\xee=[\x8c\xaa \x91d\xff9\xfa\r\xbe\x16%\xde\xa2/\xa9\\%\xc8\xfa\xd9t\xa7\x1biU\xa9_\xe5t\x9d\aj\x16\xc4}-\xf6\xd3\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\xd0\xab.\x13L8V\x1d\xa0\x02#\xb4\xea@\x1b\xd0{\x02iE\xb30\xe8\xdb[\xc8\xe5\xae\x98\xdc\xe4Tr\xb4w\xba\xa9\xfe\x0f\xdcFc\xd0\x9f\x82\x9d\xae\x9cy\xb3QOT\xdc\x86\x82Q\xe0\xab\xc1w\x03\x1b-^(\xf0\xef\xe0\xd8\b#\x9a\xcd\xe0\xf8q\x9a\xcd\xdeAF,\x04\"\x84\xa9O\x97\xf7\xfb\xa2N>\xcb\x9d\xc0\xcc\x13\x12\xcc@\x89\xf8F\x82OO\x99[\x9c\xaa\x02W\x92\x1a\xacZIz\xd4Op\x8b\x8cl\x81}\x12\x94\xcb\xad\xdb\xe4\x1a\xe8_\rOw\xa0\xc6&e\xde4v\xfaN\x15yK\t1\x1e\xe7\xb8}\x01\xb3\xb2') 10:32:23 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0x8, 0x49323159, 0x800, 0x4, 0x3, @stepwise={{0x0, 0xffffffffffff8000}, {0x5, 0xfffffffffffffff9}, {0xf782, 0xffffffff7fffffff}}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) r2 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 10:32:23 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) 10:32:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c00)) unshare(0x400) 10:32:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200, 0x0) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) syz_genetlink_get_family_id$nbd(0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000080)=0x9) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000100)={0x8000, "68b24de0976e02fd785176cfd2ff0b35921a2ed76cccac4b734c80d9ed39083e", 0x4, 0x2, 0x9, 0x2000000, 0x1, 0xad0e73f72dbac9f9, 0x401, 0x6}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x8000) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) write$input_event(r1, &(0x7f00000001c0)={{0x0, 0x7530}, 0x2, 0x3, 0x3}, 0x18) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0x0, r1}) 10:32:23 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fff, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = getpid() capset(&(0x7f0000000240)={0x19980330, r2}, &(0x7f0000000280)={0x2000000000, 0x48000000000, 0x2, 0x2, 0x489, 0x9}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) ptrace$poke(0x5, r2, &(0x7f0000000300), 0x6) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r4 = timerfd_create(0x0, 0x0) readv(r4, &(0x7f0000000440)=[{&(0x7f0000001680)=""/4096, 0x1000}], 0x1) r5 = getpgid(r2) prctl$PR_SET_PTRACER(0x59616d61, r5) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r5, 0x7, 0x100020) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x100000032, 0xffffffffffffffff, 0x0) tkill(r3, 0x1000000000016) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x3a9, 0xca5ce1a3232a76d2, 0x4, 0x8fc, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r6, 0x30, &(0x7f0000000180)=[@in={0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x10}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000200)=0x10) timerfd_create(0x9, 0x800) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000002c0)=0xa0, 0x4) 10:32:23 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) 10:32:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_genetlink_get_family_id$tipc(0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1000000000054}, 0x98) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0xa, 0x80000000000003, 0x0) fcntl$setstatus(r3, 0x4, 0x2400) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00'}) bind$packet(r3, 0x0, 0x0) r6 = openat$dsp(0xffffffffffffff9c, 0x0, 0x220080, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)={0xffffffff, 0x7}) ioctl$VHOST_SET_VRING_NUM(r6, 0x4008af10, &(0x7f0000000140)={0x3, 0x4}) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000380)=0x595, 0x4) fstatfs(r6, &(0x7f00000001c0)=""/96) r7 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x2000000000001) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000040)={r4, 0x1}) ioctl$VIDIOC_S_AUDIO(r7, 0x40345622, &(0x7f00000002c0)={0xffffffff, "0ef7273a95c61c60a4e2ab1ce86e892bba36074e4e4856110a75c4f0dfb4bcc3", 0x3, 0x1}) connect$llc(r3, &(0x7f0000000180)={0x1a, 0x324, 0x2, 0x8, 0x1000, 0x49, @random="78d2552b4ab1"}, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$VIDIOC_S_EDID(r7, 0xc0285629, &(0x7f00000000c0)={0x0, 0x0, 0x0, [], 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r5, r8, r9) 10:32:23 executing program 5: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x4000000, 0x0, 0x17f) connect$ax25(r0, &(0x7f00000002c0)={{0x3, @default}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom, @default, @bcast]}, 0x48) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) sendto$x25(r0, &(0x7f0000000600)="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", 0x1000, 0x40010, &(0x7f0000000240)={0x9, @remote={[], 0x1}}, 0x12) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000340)) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000280)={0x2, 0x8000, 0x0, 0xfe, 0x10, 0x80000001}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x3ff) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e20, @remote}}, [0x5, 0x1e9d39a5, 0x71, 0x8, 0x9, 0x2, 0x1, 0x100, 0x8, 0xaaac, 0x8, 0x8, 0x9b, 0x0, 0x8]}, &(0x7f00000000c0)=0x100) umount2(&(0x7f0000000400)='./file0\x00', 0x4) [ 193.827291] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 193.930857] audit: type=1400 audit(1566815544.058:54): avc: denied { wake_alarm } for pid=7939 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 10:32:24 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, 0x0) r5 = socket$inet6(0xa, 0x4000000080002, 0x88) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r6 = socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r7, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r6, 0x8919, &(0x7f0000000040)={'rose0\x00', {0x2, 0x2, @empty}}) ioctl$TIOCSCTTY(r4, 0x540e, 0x3f) connect$inet6(r5, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) setsockopt$inet6_udp_int(r4, 0x11, 0x10000000000001, &(0x7f0000000040)=0x1, 0x4) sendmmsg(r5, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) connect$packet(r4, &(0x7f0000000400)={0x11, 0x15, r8, 0x1, 0x1, 0x6, @broadcast}, 0x14) splice(r0, 0x0, r3, 0x0, 0x1ffffd, 0x0) 10:32:24 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) bind$isdn_base(r0, &(0x7f0000000000)={0x22, 0x0, 0x0, 0x0, 0x9}, 0x2) 10:32:24 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) 10:32:24 executing program 5: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) 10:32:24 executing program 1: r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x114, 0x2711, 0x0, &(0x7f000033bffc)) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffffa, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x108010, r1, 0x56) 10:32:24 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8800, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x200, 0x0) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa556e126111e0361}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x800, 0x70bd27, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="f800000016001d0300000000000000000000000000000000000000000000000000000000000000000000ffffe000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000850eb6600"/176], 0xf8}}, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000300)={0xa, @raw_data="577cb73cf6640dcb17f6bd2f923510f71aada6ceb4602365d4453a23bc2c29f503d677af21eae9a7700f735128940b1c2fc81da1f74484d85cd5144a71dc4a6e0732db522c8f7af0ef27024ef72433b671bcf25ea2e1bbeb2cee981b3faf9df626b5ba6309ef3c244f0a4aef602b71d6cc181f1adbeb86d9970ee49672885512b1c0b8202cc2709000317149ceddd8f7bfea55eeda18aed9e5c30e0da979f1a1661170007320d96e8b5d4fcc61cba3209f957620ffb7c3fc01b0139fd08cc2f8e68f22cb45469da4"}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x33, &(0x7f0000000040)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x507}, 0xba}}, 0x0) 10:32:24 executing program 5: gettid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) r1 = getpid() openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) r2 = getpgrp(r1) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000000600)=""/241, &(0x7f00000001c0)=0x93) ioctl$KDADDIO(r3, 0x4b34, 0x9) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000380)) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x10a}, 0x40) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f0000000080)=0x5) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) sched_rr_get_interval(r0, &(0x7f0000000400)) unshare(0x10000000) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(r2) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x400, 0x0) setsockopt$llc_int(r5, 0x10c, 0x6, &(0x7f0000000200)=0xe1f0, 0x4) accept(0xffffffffffffffff, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000000)=0x80) recvfrom$packet(r5, &(0x7f0000000280)=""/63, 0x3f, 0x20, &(0x7f00000002c0)={0x11, 0xf6, r6, 0x1, 0x8, 0x6, @dev={[], 0x27}}, 0x14) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PIO_UNIMAPCLR(r7, 0x4b68, &(0x7f0000000440)={0x4, 0x0, 0x8000}) mq_timedreceive(r4, &(0x7f0000000440), 0x0, 0x80000000, &(0x7f0000000480)={0x77359400}) geteuid() ioctl$sock_ifreq(r7, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000180)=0x6) ioctl$sock_ifreq(r7, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 194.240946] SELinux: duplicate or incompatible mount options 10:32:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000013c0)="00008200000000000000000300003fd5", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xd9, "9fc38a37caf09ace1bb7fc488bcd9f7d9bfef3b869d22de9303e29fd018158aa6e88c4c8f8670a27645a38d0cfb05085a84961cb4aca847745160abfb7016e1b6d1fce124720e1c331fea0cf67d18ce3fc32f3b65b1f5cdef611e25e7715415c57110c8459adf0eba893bb4abad1e86a6887fd5061bf43a417448d423761bd785a9b7d3847699a14a0a3c298d3b4e05ac600b503c8ec12a5101bdaf49e951faaad127f209d6a1f90aa79505ac7277a5c24642c050193901e3c1f50c0e84df7a67dd9b2e3b0bddf98eb378190519ca765a69258f6752e1b21b9"}, &(0x7f0000000140)=0xe1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000001240)={r3, 0xfc, "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"}, &(0x7f0000001380)=0x104) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:32:24 executing program 4: perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000380)={0x4, 0x0, [{0x892, 0x0, 0xf77}, {0x40000095, 0x0, 0x3}, {0x0, 0x0, 0x5}, {0x23e, 0x0, 0x9}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40600) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000040)=0x2, 0x8) pselect6(0xfffffffffffffe92, &(0x7f0000000400)={0x80000000, 0x40, 0x2, 0x0, 0x4, 0x0, 0x0, 0x800}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x3}, &(0x7f0000000440)={0x0, r2+30000000}, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r1, 0x3b70, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0x5, @remote, 0x3}], 0x2c) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f00000002c0)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="dc11cd06ded268dd5b55eeee3659bcb2acddb89aa84e3570d802991a2c21856943ee2d13611d4015b8de6a35f9c8495ec9e0be6bca8b8580195ba2347b538df98128a5e510908af2163608547f10e727b7343b96d07f7fe867bc07989ab18a7a99e7b63db3820b3fe27f26ad786042e6cb96c2bc3ad68dd8d5c7bcb027f6", 0x7e) [ 194.279416] audit: type=1400 audit(1566815544.398:55): avc: denied { setopt } for pid=7942 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:32:24 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) ftruncate(0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 10:32:24 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) [ 194.386284] audit: type=1400 audit(1566815544.508:56): avc: denied { ioctl } for pid=7992 comm="syz-executor.5" path="socket:[29204]" dev="sockfs" ino=29204 ioctlcmd=0x4b68 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 194.429222] bond0: Releasing backup interface bond_slave_1 [ 194.505307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.542455] bond0: Releasing backup interface bond_slave_1 10:32:25 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0xbf8, 0x1, [], &(0x7f00000000c0)=0x1}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x9}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x88, 0xa, 0x0, &(0x7f0000000000)) 10:32:25 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000000000bd82bbe6000000040000000080000000008000ffffffff7c0000007d5759ec47d6f86ce05be5f0f6434fec439efc436b65d8410000000002056b376bf703f4986f5e0000659510ebb1b016b08fb6c92fa464f1d58668036b8713f8243aa410b80952a19fbcc1f99ddbdd680f0495d8b2834615a13c518f776c0010000000060000000000000000000000000000000800000a0000000000000000000000060028855f5db8f52d79a47c046f2885f51d2c2cbcdae0186b5e8e1a06685c3d2102e1cde3c9ef77a47372a4e4f5c90d60acd02fa6b00eadf95d746355a9c00d200678e189b1a09c7a0be124e184fdfc5d5adc674ed31dc948041b8c671e8338c54244338d822fd6a3301615e4cb5d7e003ce736be085a00f6e7ac4cbf3cef78d06acd00afff9ef880d8810e42e2b709cbd8d86bde774ca793657d4398e4b7809f43950684499257b110eb05090c7f8ce0d4b022f3ff337b53894f0000000000000000000000000000c2f75b5477f2110a2cc36c3d078ce4932f9612d56dac58875163461753f070e65435b7137c9474a3f90bce823a4f625c7cb73fbb1d098dedfdd1f4fb4daca37fb3016d11303e723ad3d2b8a3f8c7e15cbb8de2469cc1fca9422e5247b3d0f1215587b33cd02c091fe842b22d9a409ce439b385c7f9a562a120dcbc8d9c58e26f291a5662bca9b3891a58139b30d75c000000000000000000"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:25 executing program 1: r0 = socket$unix(0x1, 0x7, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = creat(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x180) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @multicast1, @dev}, &(0x7f0000000500)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000900)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000940)={@initdev, @remote, 0x0}, &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000bc0)={@dev, @remote, 0x0}, &(0x7f0000000c00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c40)={0x0, @broadcast, @multicast1}, &(0x7f0000000c80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000e00)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001000)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000001400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001040)={0x374, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0x108, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x1b8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffb}}}]}}]}, 0x374}}, 0x1) bind$unix(r1, &(0x7f0000000680)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r19 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r19, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$unix(r0, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000180)=0x2, 0x4) accept4$unix(r1, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 10:32:25 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xb5453e57b34acd1d, &(0x7f0000000140), 0xcff41f512c07beb, 0x0, 0xfffffffffffffcfb}, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000200)={0x5, 0x0, 0x0, 0x0, 0x5}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 10:32:25 executing program 5: r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000006c0)="2e00000022008151e00f80ecdb4cb904054865160b000a0006000000000009000e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="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") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000340)=ANY=[@ANYBLOB="62726f7574650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000163b940d0000000000000000000700000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB='\x00'/120], 0xe8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000004c0)={0x0, 0xfffffffffffffffa}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000540)={r2, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, 0x9}}, 0x400, 0x1, 0x0, 0x80000001}, &(0x7f0000000600)=0x98) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f00000000c0)) 10:32:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80480, 0xef79760ebb612113) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f00000002c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000400)=0xe8) r6 = getegid() write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)={0x158, 0x0, 0x2, [{{0x1, 0x2, 0xffffffffffffffc0, 0xbc, 0x6, 0x4, {0x2, 0x5, 0x999, 0x40ee, 0x3f, 0x0, 0x3, 0x1, 0x9aba, 0x0, 0xffffffffffffffc0, r3, r4, 0x6280000000000000, 0x7}}, {0x2, 0x0, 0x9, 0x40, '/dev/kvm\x00'}}, {{0x6, 0x1, 0xffffffff00000000, 0x0, 0x20, 0xdb99, {0x0, 0x8, 0x2, 0x3, 0x4, 0x6, 0x10000, 0x3, 0x7, 0x1000, 0xba5c, r5, r6, 0x2, 0xffffffff}}, {0x5, 0xfffffffffffffff8, 0x1, 0x5, '@'}}]}, 0x158) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f00000005c0)={0x40, 0x14, [0xffffffffffffff81, 0x0, 0x7ff, 0x3f, 0x47800000000000]}) [ 194.925675] audit: type=1400 audit(1566815545.048:57): avc: denied { ioctl } for pid=8020 comm="syz-executor.5" path="socket:[29250]" dev="sockfs" ino=29250 ioctlcmd=0x9432 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:32:25 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001840)='/proc/self/net/pfkey\x00', 0x140, 0x0) socket$rds(0x15, 0x5, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0xa00, 0x40) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, r3) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, 0x0) io_setup(0x800, &(0x7f0000000640)=0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r4, 0x0, &(0x7f00000001c0)) ioctl$KVM_RUN(r0, 0xae80, 0x0) timer_gettime(0x0, 0x0) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x2, 0x86fc32ebdc82b7eb}, 0x10) 10:32:25 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:25 executing program 4: setns(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000003, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f0000000a40)) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='syz', &(0x7f0000000100)='syz', &(0x7f0000000200)='\\system\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='syz', &(0x7f00000002c0)='syz', &(0x7f0000000300)='self&)\x00'], &(0x7f00000005c0)=[&(0x7f0000000380)='maps\x00', &(0x7f00000003c0)='maps\x00', &(0x7f0000000400)='keyring(!\x00', &(0x7f0000000440)='em1selinux[{\x00', &(0x7f0000000480)='user\x00', &(0x7f00000004c0)='user\x00', &(0x7f0000000500)='[[em0$(selinux\x00', &(0x7f0000000540)='mime_typecgroupselinux\x00', &(0x7f0000000580)='user\x00']) [ 195.039216] EXT4-fs (loop2): feature flags set on rev 0 fs, running e2fsck is recommended 10:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]) [ 195.092733] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 10:32:25 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000000000bd82bbe6000000040000000080000000008000ffffffff7c0000007d5759ec47d6f86ce05be5f0f6434fec439efc436b65d8410000000002056b376bf703f4986f5e0000659510ebb1b016b08fb6c92fa464f1d58668036b8713f8243aa410b80952a19fbcc1f99ddbdd680f0495d8b2834615a13c518f776c0010000000060000000000000000000000000000000800000a0000000000000000000000060028855f5db8f52d79a47c046f2885f51d2c2cbcdae0186b5e8e1a06685c3d2102e1cde3c9ef77a47372a4e4f5c90d60acd02fa6b00eadf95d746355a9c00d200678e189b1a09c7a0be124e184fdfc5d5adc674ed31dc948041b8c671e8338c54244338d822fd6a3301615e4cb5d7e003ce736be085a00f6e7ac4cbf3cef78d06acd00afff9ef880d8810e42e2b709cbd8d86bde774ca793657d4398e4b7809f43950684499257b110eb05090c7f8ce0d4b022f3ff337b53894f0000000000000000000000000000c2f75b5477f2110a2cc36c3d078ce4932f9612d56dac58875163461753f070e65435b7137c9474a3f90bce823a4f625c7cb73fbb1d098dedfdd1f4fb4daca37fb3016d11303e723ad3d2b8a3f8c7e15cbb8de2469cc1fca9422e5247b3d0f1215587b33cd02c091fe842b22d9a409ce439b385c7f9a562a120dcbc8d9c58e26f291a5662bca9b3891a58139b30d75c000000000000000000"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000840)="470f01cf0f01740fa748b8e31a0000000000000f23d80f21f835000000600f23f80f01ca48b802000000000000000f23d00f21f835300000050f23f8440f20c03505000000440f22c0b9800000c00f3235002000000f30666466460f38284a8cc4a179283e460f23be"}], 0x1, 0x0, 0x0, 0x267) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000c000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="0f06263e0f300f01c426f30fc776130f01c5f30fc7b4cd08000000e300c4c3fd01bcfc7ff800002e0f7938f4", 0x2c}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x87, &(0x7f0000000080)='/dev/kvm\x00'}, 0x79) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file0\x00', 0x9bd7, 0x4, &(0x7f0000000580)=[{&(0x7f0000000300)="ace7d5082ccf07d05457edcec27ee6a00b2ad1276ae51ca8c545954423d8f733eb7923de7b4a95ed6c9688df6fe3674f4b625aab76b801b89bf7cec76158ebda89c9029f41723435528f525445ab4c96c373a315a3b69b9c0c13cc67ffcf9a08aa6cfe9afb2b8ac472f49e33879192fd408e719151a6e641d8baf44a3b913e6ad8fd4eea970b6ade806792ac32d3275fc671fd1f77449738699409317b27da225c7a46cee0249702bcda26019b2a281875d439e174937bd76b7f9cc7e7049a5d75d035c1e8aa8f55029901a8e4978f7b065fe31b1016d9faa690d5d8c507c019e43552621b", 0xe5, 0x40}, {&(0x7f0000000400)="64fed07fed54e6b3a4fd53e9b229b8a310c235f6db8df0feecc95a1664c870a3237ee831365d5dfc41d86de0c1cdb0343e4c9e3645f401e9419cd61ed16ea142cdb664ec7ae7a07384495b1e99f4a7f34b9acdd58eb0f21767921412afce9e3c9a30206ec40b80c660929bc4966422c0b48b3b6b8c1a674213f7220d62b2a4fa8e7758cc5d0cb783ccac8576efc0cfd62ed9cfaa424d698c267affb77763ac81e0ea1d316122f6d7c2f5b8205f563f8e3170", 0xb2, 0x7}, {&(0x7f0000000240)="3a8ac793e23892", 0x7, 0x100000000}, {&(0x7f00000004c0)="ec23878d6edac0812b5313faf0beeaa2b064a8f3ee40c63a6815eaf90821d7f2bb2cb30a2810662082b7e35fe71b3503ee517e6c0b991f44940d80cbc532d67610ec2bac76f1d58e3a9e7a7264c410dfd8ef6cf98a4b3ee6fd99bc85125528caeed0af700ec3aead3434b9f6586a70aa8adba8692a16c90af55b70fae8f022895e72b54790413fb029c0bac31fa4297aac1e08c1e8778dd9beb8a87dfef901c198d97d3dca8d70214618f577f0", 0xad}], 0x1008, &(0x7f00000006c0)={[], [{@audit='audit'}, {@measure='measure'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x1ff}}, {@obj_user={'obj_user', 0x3d, 'B%:usersystem*@\xd1posix_acl_accesscgroup@mime_type@^/}'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/kvm\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/kvm\x00'}}, {@fowner_gt={'fowner>', r3}}, {@obj_user={'obj_user', 0x3d, ',/*'}}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:32:25 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0xbf8, 0x1, [], &(0x7f00000000c0)=0x1}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000180)={0x0, 0x9}, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x0, 0x10000101) r2 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r2, 0x88, 0xa, 0x0, &(0x7f0000000000)) [ 195.163500] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 10:32:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') pread64(r0, 0x0, 0x0, 0x0) 10:32:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0xffff, 0x9, &(0x7f0000000900)=[{&(0x7f0000000180)="252d1100ee84c7dd0491dd36d31acd7db54ea0610e5b8731a10ddcc1cd3c26cf2435862ee21333bc11bc8d041c55c0efb8ba64347a6ac5af9b24955b82db0a63be21727f967b88b82a8caf6e49ddc45e8ed839d4e73970761f0eb9ea86a38bdae4e8177eaf0e2cb4eb75ae051c102de8c7c160fcde557e01", 0x78}, {&(0x7f00000002c0)="f6385a525b031da1ec2f3cb8e2b545520b393ea769fec263d2ebf9fb61198c1ef3fa257a273f70b122d27957714f6ada168d47eede9659d928", 0x39, 0xfffffffffffffffe}, {&(0x7f00000003c0)="b6a8b64a41a9a16f0b8dca0efb12ae60ff1d99a05efdd8e614a51b436ddf373fef5206200f52bf99f8222c2d54a7a38506a0e1d46e6a5e90bbf45aa3251a55873e18a31c865b6878b0dd72946d19", 0x4e, 0x2}, {&(0x7f0000000440)="adea0ccb2bebcbee81f377501f0f0e6348b585dc59e3c6a6fd7f31c06ff3a47be298d91855cb5372d12586a2463ce7b2d1281716b1d681ac5e694eca9f7f12bbeee37c7c5e3d692816570815a677d9b3b806078f848e7e8ed6ada8215b02c18d164c3f84cb856db68cd213209582b47aead255dde6b39c9616302f67930b22269418c8b1cfa89031d11f13bebdfe0b8135267c166b9992444aff4bc8665fdd5d50ab6e37c29335f2057b57b3782a0453be3821eb3a9381d22c0f3a962c2627285a69565dac67175558a56eeba5fc092c8971289660b0a060", 0xd8, 0x8}, {&(0x7f0000000540)="6ca802da6ee54d21ddd99e355a77f4eef0fc37ef9f0525d4a93898e2b1f393d6ca2a81d57c64cc68dbb388739b253a002bec10890c63172533ca4bad9c7ac1a9f2d594e3e8bee6220ab42b1151ce2712872e0b55d410ff51c7467c751afd3ea7da8b3bdd50b5717d0a28d78e7cdba06d9682cbe70d5a951183f6940d57b50786353aeaa7146b465bbbb4a5d2dda789e5d5c0d25efb12cfa2c2767c8bce85c9fd1f3f9a6d7973423677a07aef51d912a29eaf4d4355613df26df630aeebf892e545f2ac468bcf562035d024e434e0e40fec890597e3e5c8b0451fee421914750959d2c07e39fe56beb80c234894e8872945c947989316", 0xf6, 0x7c}, {&(0x7f0000000340)="facc905b5d2291c2c92c7f1740cf16", 0xf, 0x2}, {&(0x7f0000000640)="c6579d8cb7ef2b7c49558b47c9244d46716c023e13864e8a683dd5806c9a8c634772c77b8a13879035c599fd03d3242f27a785056a0a3affa29ad0fbb16f8d0615eb3ac9ae3932b133a2967de5bec7492fb3256b", 0x54, 0x8001}, {&(0x7f0000000780)="04ebbac349df97a4aabd151d96781a818f9713f9268392766ee42d67c36bceebc0c600f832ec593be66641d14c05c76e99ebb4c6664273e7fd1ed10b6c7cce4756b0", 0x42, 0x8}, {&(0x7f0000000800)="448ed0ebcd90812bcaa192ca6609c5ff455462d1459e4bf93bca194ee4f6e278463f37a1722539c98a6269527e3d18330fd79bc9f0f42b279d64ec9aecd4e93c8adba00baebe5d92f9683ba6c0ee7cbc229cab9e9130f20c71c8bb2307142ccbe0a62ff47ff9128c0297e7fb49a3070ea3a4a74da84a7feb0f87d9f33e2f4d4d1c7bb18f6530e9c3f739ca5fc82021f8ff2d8c3ef2226e2c6985dfc808a94b15a63469990679fd8bdd725436c81368e394a9a6219392b4d55ecc6f035d5d03fe7fae2194e5ef8418814f872b25921f1846e24f1ec1652b0b9bfa2b1e594ede240a5eee10b64063cfa984e61a3ca0", 0xee, 0x3f}], 0x40004, &(0x7f0000000a80)={[{@nobarrier='nobarrier'}, {@creator={'creator', 0x3d, "0fb34607"}}, {@nodecompose='nodecompose'}, {@session={'session', 0x3d, 0x2}}, {@part={'part', 0x3d, 0x9}}, {@uid={'uid', 0x3d, r0}}, {@nodecompose='nodecompose'}]}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getgid() setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000c00)=@broute={'broute\x00', 0x20, 0x3, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, 0x0, &(0x7f0000001700)=ANY=[@ANYRES32, @ANYRES32=r1]}, 0x80) openat$zero(0xffffffffffffff9c, 0x0, 0x10040, 0x0) readlink(0x0, 0x0, 0xa) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB]}}, 0x0) [ 195.215309] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 195.246027] EXT4-fs (loop2): failed to open journal device unknown-block(0,0): -6 10:32:25 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f900"/76, 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) vmsplice(0xffffffffffffffff, &(0x7f0000000900)=[{&(0x7f0000000600)}, {0x0}, {&(0x7f0000000840)}], 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x218b, 0x30}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0xfffffffffffffff7, 0x2, [0xd6, 0x4]}, 0xc) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/8, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, 0x0) 10:32:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x10588e, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4402, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='binfmt_misc\x00', 0x0, 0x0) 10:32:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'ip6_vti0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x1d, r3}, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{0x1, 0xffffffff, 0x800, 0x9}, 0x5, 0x5dd12bf18884983d, 0x0, 0x0, "3f680e95649f09df"}, 0x10}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) r4 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) bind$llc(r4, &(0x7f0000000040)={0x1a, 0x13, 0x3, 0xa22, 0x7, 0x3, @broadcast}, 0x10) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r1, &(0x7f0000001300), 0x249, 0x0) mmap$perf(&(0x7f0000ff9000/0x6000)=nil, 0x6000, 0x2000000, 0x30, r0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) nanosleep(&(0x7f00000000c0)={0x77359400}, 0x0) 10:32:25 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x80000, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000600)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) accept$unix(r0, 0x0, &(0x7f0000000380)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, 0x0, &(0x7f0000000180)=@sha1={0x1, "0258cf999bef3a52768b67a9ad1587ffa4fc6842"}, 0x14, 0x1) bind$inet(r2, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000002c0)={0x750, {0x2, 0xffbffffffffffffe, @dev}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e20, @broadcast}, 0x100, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x1000, 0x800000002, 0xffffffffffffffff}) r5 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000003440)) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={r0, &(0x7f00000004c0)="693ed3322e4e671f0b97057b3cc4c205814577604d6e0ee4a2c8c876698ef748a66cc299fabe3841bf391e096d3fcbc97e97820bdb392ef9aaa8f1e440e07df4a73010be7fe777c9d010fbe62e20e654ab49b399e7aac09df64020c1f5c0089330b5ac4e1fecf5af3e77e216fd1d94800eaa5c90ef3abca4eb51b189dc2bf26d0717afadc37f5a0e39b289238f546bc07105a3886a542fb9b285db4335645e33c29a8dc0ad54214624ef2d42"}, 0x10) r6 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x82) ioctl$RTC_AIE_ON(r6, 0x7001) fadvise64(r1, 0x0, 0xffff, 0x4) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000240)=0x8) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000001c0)={r5, 0x0, 0x2, 0x5, 0x100}) unshare(0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000480)) timer_create(0x7, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000140)) ioctl$PPPIOCSMRU1(r6, 0x40047452, &(0x7f0000000200)=0x9) timer_settime(0x0, 0x0, 0x0, &(0x7f0000001240)) [ 195.429665] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:25 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) [ 195.534094] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000200)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000000040)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x24, &(0x7f0000000080)={0x0, 0x0}, 0x10) r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 10:32:25 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c8081000000000000000000051c50c4e309"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000000000/0x10000)=nil, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x180) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000080)) ftruncate(r0, 0x2) [ 195.589521] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.645708] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000140)) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000400)={{0x2, 0x4e20, @empty}, {0x307, @dev={[], 0x20}}, 0x26, {0x2, 0x4e24, @broadcast}, 'nlmon0\x00'}) setsockopt$inet6_int(r1, 0x29, 0x24, &(0x7f0000000000)=0x80000000, 0x4) syz_emit_ethernet(0x66, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"/398], 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'lapb0\x00', &(0x7f00000000c0)=@ethtool_coalesce={0xf, 0x5, 0xfffffffffffffffd, 0x5, 0x2, 0xa5eb, 0x97ea, 0x0, 0xa9db, 0x1a, 0x401, 0x7c, 0x7, 0x3, 0x1, 0x81, 0x3, 0x67e8, 0x1, 0x1, 0x466181e2, 0x7, 0x3}}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000480)=0x1, r3, 0x0, 0x2, 0x4}}, 0x20) r4 = fcntl$getown(r0, 0x9) sched_getscheduler(r4) 10:32:25 executing program 4: r0 = socket$packet(0x11, 0x80000000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000540)=0x20, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet(0x2, 0x3, 0x29) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x4) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000000)) splice(r1, 0x0, r3, 0x0, 0x400000000010005, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000000c0)={[0x5c24, 0x8, 0x4, 0x3, 0x0, 0x4, 0x132, 0x1f, 0x3f, 0x1, 0x9, 0x2, 0x4, 0x100000001, 0x2, 0x7], 0x3000, 0xf516a007f17f4f6c}) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) fsetxattr(r3, &(0x7f0000000180)=@random={'security.', '\x00'}, &(0x7f0000000200)='\x00', 0x1, 0x3) [ 195.713302] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:25 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) [ 195.768261] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.819344] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.857624] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 10:32:26 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f0000000640)=0x84) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000002c0)={r1}, 0x1) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000700)={0x10000, 0x200}) bind$isdn(r2, &(0x7f0000000680)={0x22, 0x80, 0x400, 0x9, 0x6}, 0xffffff2b) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4}, 0x1c) r3 = syz_open_dev$vcsa(&(0x7f0000000540)='/dev/vcsa#\x00', 0x0, 0x4001) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/autofs\x00', 0x80000, 0x0) socket$inet(0x2, 0x5, 0x1) mq_notify(r4, &(0x7f0000000500)={0x0, 0x10, 0x3, @thr={&(0x7f0000000400)="e46283c8fa9d95dc75d0e2f5be7237cde7e2457d29240ea0c85813377d8b27b238dbb32d500573f7", &(0x7f0000000440)="596b15aabcf86cd6a9e68cd3abf29364c32f219674b3e971453dd807b1817d7799ad3e16854d7d43770f807e933e21e8ea48f28a6e0f4d12b40f6a89317d0dc97b13a9af1a8473b917fd03ef42979e12ebf44b484268fe8929abc232ead7e9418b0f132e06c1d6e7f61f4c7fe2263519e7a1a80369d572f659d45b2838b7e0429a32441f129c"}}) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x200) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x3}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r5, @in={{0x2, 0x4e23, @loopback}}}, &(0x7f0000000100)=0x84) accept4(r0, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80, 0x800) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x9866b01f59919a8f, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IMADDTIMER(r6, 0x80044940, &(0x7f00000007c0)=0xf4240) clock_nanosleep(0xfffffffffffffff4, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r7, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x5, 0x0, 0x0, @local}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x40000000000014e, 0x2000000) 10:32:26 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6174000000000000bd82bbe6000000040000000080000000008000ffffffff7c0000007d5759ec47d6f86ce05be5f0f6434fec439efc436b65d8410000000002056b376bf703f4986f5e0000659510ebb1b016b08fb6c92fa464f1d58668036b8713f8243aa410b80952a19fbcc1f99ddbdd680f0495d8b2834615a13c518f776c0010000000060000000000000000000000000000000800000a0000000000000000000000060028855f5db8f52d79a47c046f2885f51d2c2cbcdae0186b5e8e1a06685c3d2102e1cde3c9ef77a47372a4e4f5c90d60acd02fa6b00eadf95d746355a9c00d200678e189b1a09c7a0be124e184fdfc5d5adc674ed31dc948041b8c671e8338c54244338d822fd6a3301615e4cb5d7e003ce736be085a00f6e7ac4cbf3cef78d06acd00afff9ef880d8810e42e2b709cbd8d86bde774ca793657d4398e4b7809f43950684499257b110eb05090c7f8ce0d4b022f3ff337b53894f0000000000000000000000000000c2f75b5477f2110a2cc36c3d078ce4932f9612d56dac58875163461753f070e65435b7137c9474a3f90bce823a4f625c7cb73fbb1d098dedfdd1f4fb4daca37fb3016d11303e723ad3d2b8a3f8c7e15cbb8de2469cc1fca9422e5247b3d0f1215587b33cd02c091fe842b22d9a409ce439b385c7f9a562a120dcbc8d9c58e26f291a5662bca9b3891a58139b30d75c000000000000000000"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) [ 195.949231] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 195.976580] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 196.354423] syz-executor.0 (8088) used greatest stack depth: 24224 bytes left [ 196.400127] net_ratelimit: 2 callbacks suppressed [ 196.400133] protocol 88fb is buggy, dev hsr_slave_0 [ 196.410131] protocol 88fb is buggy, dev hsr_slave_1 [ 196.472164] device bridge_slave_1 left promiscuous mode [ 196.485524] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.564295] device bridge_slave_0 left promiscuous mode [ 196.569832] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.640143] protocol 88fb is buggy, dev hsr_slave_0 [ 196.645412] protocol 88fb is buggy, dev hsr_slave_1 [ 196.763779] device hsr_slave_1 left promiscuous mode [ 196.803959] device hsr_slave_0 left promiscuous mode [ 196.844846] team0 (unregistering): Port device team_slave_1 removed [ 196.864321] team0 (unregistering): Port device team_slave_0 removed [ 196.899065] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 197.043158] bond0 (unregistering): Released all slaves 10:32:27 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000080)={0x0, 0x10000000}) 10:32:27 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) connect$bt_sco(r0, &(0x7f0000000000), 0x8) 10:32:27 executing program 3: mkdir(&(0x7f0000000b00)='./file1\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x51, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(0x0, 0x0) pipe2(0x0, 0x4000000000002) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty, 0x6b}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000006c0)=""/42) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={0x10000, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x40, @mcast2}}}, 0x108) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000400)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='bpf\x00', 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000240)='./file0/../file0\x00') mknod$loop(0x0, 0x2000000000800, 0x1) read$eventfd(r1, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x4, &(0x7f00000000c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000ac0)='./file0\x00', 0x3ffffffffffffffc, 0x0) geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) fstat(r1, &(0x7f0000000a00)) syz_mount_image$ext4(&(0x7f0000000340)='ext3\x00', &(0x7f0000000380)='./file0/bus\x00', 0x7e000000, 0x1, &(0x7f0000000500)=[{&(0x7f0000000780)="be627af486fe832c7cc1feac0f1b5203b9d20cad368b6dab23ea8ea11faea1753b7c0f17239a609d13420ed833f15e091ee254dcf13387aef8a9a356b1582c73fa7ae28570e102dd6c614564b7dee4a89f17effb5af9c8ede2d10798c56b05792fb44d9b3dff739bfc0db6bb301887fa14f498318442794ddbe2202d851c2950a27cd18b4cc15bfb66ed100d4057bd9287d720313903332f3d0704a513a4d318067bcff7d0", 0xa5, 0x400}], 0x220000, 0x0) 10:32:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000006c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x14, 0x3, 0x10000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 10:32:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000080)) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x400) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000280)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x8000008000000005, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xd, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = dup2(r1, r4) dup3(r5, r3, 0x0) 10:32:28 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x400, 0x0) r1 = fcntl$getown(r0, 0x9) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x4, 0xffff, 0x0, r1}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r2, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00') lseek(r3, 0xfffffefffffffffa, 0x1) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f00000000c0)='hwsim0\x00'}) sendfile(r3, r3, 0x0, 0x0) 10:32:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r2, 0x0, 0x3}, 0x10) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000200)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "131b43", "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"}}, 0x110) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x20c82, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x20000}}, 0x18) [ 198.905907] ------------[ cut here ]------------ [ 198.910780] WARNING: CPU: 0 PID: 5 at net/xfrm/xfrm_state.c:2336 xfrm_state_fini+0x1f1/0x260 [ 198.919339] Kernel panic - not syncing: panic_on_warn set ... [ 198.919339] [ 198.926676] CPU: 0 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.140 #36 [ 198.933225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.942567] Workqueue: netns cleanup_net [ 198.946620] Call Trace: [ 198.949186] dump_stack+0x138/0x197 [ 198.952794] panic+0x1f2/0x426 [ 198.955960] ? add_taint.cold+0x16/0x16 [ 198.959910] ? xfrm_state_fini+0x1f1/0x260 [ 198.964122] ? xfrm_state_fini+0x1f1/0x260 [ 198.968333] __warn.cold+0x2f/0x36 [ 198.971851] ? ist_end_non_atomic+0x10/0x10 [ 198.976143] ? xfrm_state_fini+0x1f1/0x260 [ 198.980354] report_bug+0x216/0x254 [ 198.983957] do_error_trap+0x1bb/0x310 [ 198.987914] ? math_error+0x360/0x360 [ 198.993387] ? _raw_spin_unlock_irq+0x5e/0x90 [ 198.998310] ? flush_work+0x403/0x730 [ 199.002093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.006915] do_invalid_op+0x1b/0x20 [ 199.010615] invalid_op+0x1b/0x40 [ 199.014044] RIP: 0010:xfrm_state_fini+0x1f1/0x260 [ 199.018859] RSP: 0018:ffff8880a9cd7be0 EFLAGS: 00010297 [ 199.024200] RAX: ffff8880a9cc2140 RBX: ffff8880866a0040 RCX: 0000000000000000 [ 199.031445] RDX: 0000000000000000 RSI: ffff8880a9cc2a10 RDI: 0000000000000001 [ 199.038865] RBP: ffff8880a9cd7bf8 R08: ffff8880a9cc2140 R09: ffff8880a9cc2a30 [ 199.046123] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880866a1c80 [ 199.053382] R13: ffff8880a9cd7cf0 R14: ffffffff880b79b8 R15: dffffc0000000000 [ 199.060653] ? xfrm_policy_fini+0x290/0x290 [ 199.064951] xfrm_net_exit+0x25/0x70 [ 199.068650] ops_exit_list.isra.0+0xaa/0x150 [ 199.073033] cleanup_net+0x3ba/0x880 [ 199.076731] ? unregister_pernet_device+0x80/0x80 [ 199.081548] ? __lock_is_held+0xb6/0x140 [ 199.085599] ? check_preemption_disabled+0x3c/0x250 [ 199.090593] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 199.096021] process_one_work+0x863/0x1600 [ 199.100234] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 199.104879] worker_thread+0x5d9/0x1050 [ 199.108835] kthread+0x319/0x430 [ 199.112175] ? process_one_work+0x1600/0x1600 [ 199.116731] ? kthread_create_on_node+0xd0/0xd0 [ 199.121382] ret_from_fork+0x24/0x30 [ 199.126626] Kernel Offset: disabled [ 199.130311] Rebooting in 86400 seconds..