[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 22.158961] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.468101] random: sshd: uninitialized urandom read (32 bytes read) [ 23.811012] random: sshd: uninitialized urandom read (32 bytes read) [ 24.524546] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.32' (ECDSA) to the list of known hosts. [ 30.106482] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/15 11:09:39 fuzzer started [ 31.576091] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/15 11:09:41 dialing manager at 10.128.0.26:46669 2018/08/15 11:09:48 syscalls: 1 2018/08/15 11:09:48 code coverage: enabled 2018/08/15 11:09:48 comparison tracing: enabled 2018/08/15 11:09:48 setuid sandbox: enabled 2018/08/15 11:09:48 namespace sandbox: enabled 2018/08/15 11:09:48 fault injection: enabled 2018/08/15 11:09:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/08/15 11:09:48 net packed injection: enabled 2018/08/15 11:09:48 net device setup: enabled [ 41.664232] random: crng init done 11:12:03 executing program 0: add_key(&(0x7f0000002000)='dns_resolver\x00', &(0x7f000080f000), &(0x7f0000726000), 0x0, 0xffffffffffffffff) 11:12:03 executing program 1: syz_emit_ethernet(0x18b, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x806, 0x0, @remote, @local}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e57044", 0xfffffffe, "cd98e8"}}}}}}, &(0x7f0000000100)={0x0, 0x3, [0x0, 0x20000043]}) 11:12:03 executing program 7: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) r1 = socket(0x400000000010, 0x3, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x1000, 0x0, [0xfffffffe]}) 11:12:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000240)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'bcsh0\x00', 0x2401}) 11:12:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xffffff85, 0x7, 0x2, 0x1}]}, &(0x7f0000f6bffb), 0x0, 0xfffffe21, &(0x7f00001a7f05)=""/251}, 0x18) 11:12:03 executing program 6: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f00000000c0)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="12"]}, 0x18}}, 0x0) 11:12:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5412, &(0x7f0000000180)) r1 = add_key$keyring(&(0x7f00000016c0)='keyring\x00', &(0x7f0000001700), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000017c0)='keyring\x00', &(0x7f0000001800), 0x0, 0x0, r1) keyctl$unlink(0x9, r2, r1) 11:12:03 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='jqfmt=vfsv0,commit=-']) [ 174.517363] IPVS: ftp: loaded support on port[0] = 21 [ 174.541885] IPVS: ftp: loaded support on port[0] = 21 [ 174.551847] IPVS: ftp: loaded support on port[0] = 21 [ 174.558045] IPVS: ftp: loaded support on port[0] = 21 [ 174.570762] IPVS: ftp: loaded support on port[0] = 21 [ 174.585394] IPVS: ftp: loaded support on port[0] = 21 [ 174.591406] IPVS: ftp: loaded support on port[0] = 21 [ 174.612103] IPVS: ftp: loaded support on port[0] = 21 [ 176.964671] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.971194] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.011305] device bridge_slave_0 entered promiscuous mode [ 177.052332] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.058746] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.088271] device bridge_slave_0 entered promiscuous mode [ 177.098931] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.105325] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.113198] device bridge_slave_0 entered promiscuous mode [ 177.134786] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.141187] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.155188] device bridge_slave_0 entered promiscuous mode [ 177.179423] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.185838] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.195058] device bridge_slave_1 entered promiscuous mode [ 177.207720] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.214132] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.223603] device bridge_slave_0 entered promiscuous mode [ 177.235656] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.242053] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.270194] device bridge_slave_1 entered promiscuous mode [ 177.279497] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.285918] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.294906] device bridge_slave_0 entered promiscuous mode [ 177.304533] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.310921] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.318751] device bridge_slave_0 entered promiscuous mode [ 177.338815] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.345262] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.360977] device bridge_slave_1 entered promiscuous mode [ 177.369412] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.375875] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.384637] device bridge_slave_1 entered promiscuous mode [ 177.393302] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.399715] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.411780] device bridge_slave_0 entered promiscuous mode [ 177.421907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.431192] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.437592] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.453915] device bridge_slave_1 entered promiscuous mode [ 177.468280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.477499] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.483902] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.491462] device bridge_slave_1 entered promiscuous mode [ 177.501276] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.510480] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.516873] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.535611] device bridge_slave_1 entered promiscuous mode [ 177.547539] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.553946] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.572206] device bridge_slave_1 entered promiscuous mode [ 177.590116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.598849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.607672] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.615131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.639063] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.646841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.658980] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.707320] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 177.732525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.786630] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.795479] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.824996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 177.875594] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 178.063268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.100870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.157621] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.197633] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.209372] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.221111] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.258550] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.294953] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.304655] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 178.323477] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.334007] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.349008] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.378147] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.397741] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.404661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.441403] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.455168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.462099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.487935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.498253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.508273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.526678] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 178.543543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.550454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.566402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.574312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.590892] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.597838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.614404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.621465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.638589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.648323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.686437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.693349] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.706742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.726341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.735353] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 178.742283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.750785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.780618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.804564] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.813369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.852392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.870162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.894756] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.929551] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 178.952702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.966996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.106418] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.124762] team0: Port device team_slave_0 added [ 179.170165] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.188072] team0: Port device team_slave_0 added [ 179.210777] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.231952] team0: Port device team_slave_0 added [ 179.257130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.274950] team0: Port device team_slave_0 added [ 179.285411] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.304384] team0: Port device team_slave_0 added [ 179.316298] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.330546] team0: Port device team_slave_1 added [ 179.345651] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.365689] team0: Port device team_slave_0 added [ 179.375103] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.390601] team0: Port device team_slave_1 added [ 179.405931] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.416903] team0: Port device team_slave_0 added [ 179.422390] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.435745] team0: Port device team_slave_1 added [ 179.458606] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.474912] team0: Port device team_slave_1 added [ 179.483406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.493119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.508953] team0: Port device team_slave_1 added [ 179.522076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.529775] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 179.546999] team0: Port device team_slave_0 added [ 179.558493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.568455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.588008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.600898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.611549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.618701] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.626131] team0: Port device team_slave_1 added [ 179.634025] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.641782] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.660653] team0: Port device team_slave_1 added [ 179.675983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.682935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.698502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.717107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.725657] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.738958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.746959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.757167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.767097] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 179.774585] team0: Port device team_slave_1 added [ 179.782324] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.792110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.799295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 179.806512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.831743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.855893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.880669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.888434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.896174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.903821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.911712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.920316] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 179.927460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.935916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.947187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.954522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.962775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.987108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 179.997069] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.006545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.014423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.024998] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.033441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.047056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.075139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.100655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.114588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.122518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.129976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.137857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.145396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.153360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.161492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.169612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 180.178489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.187090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.196446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 180.212779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 180.223463] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.231753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.241130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.251115] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.261980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.281167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.293588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.301334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.309009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.319081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.327014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.341833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.358277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.365702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.373504] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.397503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.422896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.446772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.465938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.478980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.486815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.499655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.506912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.515532] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.525058] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 180.535376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.545282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 180.573901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.582506] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.591803] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.599427] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.615434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.638069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.665948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.688896] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.696941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.749596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.757886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.787022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.893025] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.902801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.925957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 181.919442] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.926004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.933013] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.939417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.962003] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.968483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.007272] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.013723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.020434] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.026847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.080574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.095931] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.102349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.109059] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.115462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.143280] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.166289] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.172726] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.179433] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.185854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.216737] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.245011] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.251433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.258142] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.264559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.329750] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.343708] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.350114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.356833] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.363294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.401491] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.427781] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.434207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.440938] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.447347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.489926] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.678168] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.684604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.691364] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.697780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.757617] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.997451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.008395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.047649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.054968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.063109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.070862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.078199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.683708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.925401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.030525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.141463] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.187946] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.229824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.256609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.303280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.439916] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.563915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.585640] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.723723] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.730073] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.741733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.774885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.783452] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.790872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 188.964320] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 188.970548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.984344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.009911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.055468] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 189.183177] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.189474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.201971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.304943] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.324986] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.331924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.346092] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.395895] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.404987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.424064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.448874] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.455717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.470406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.548086] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.554329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.562063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.588397] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.626925] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 189.635900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.647757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.901084] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.919885] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.979282] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.087845] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.109364] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.209103] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.637607] REISERFS warning (device loop3): super-6508 reiserfs_parse_options: bad value - for -ocommit [ 192.637607] [ 192.733768] REISERFS warning (device loop3): super-6508 reiserfs_parse_options: bad value - for -ocommit [ 192.733768] 11:12:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c6ff0), 0x0, &(0x7f00009dffb8)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) close(r2) 11:12:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getdents64(r0, &(0x7f0000001c00)=""/4096, 0x1000) getdents64(r0, &(0x7f0000000340)=""/57, 0x18) 11:12:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xffffff85, 0x7, 0x2, 0x1}]}, &(0x7f0000f6bffb), 0x0, 0xfffffe21, &(0x7f00001a7f05)=""/251}, 0x18) 11:12:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b20000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7}]}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00007ed000)=[{&(0x7f0000000140)='u', 0x1}], 0x1, &(0x7f00000000c0)}}], 0x1, 0x0) shutdown(r1, 0x1) 11:12:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xffffff85, 0x7, 0x2, 0x1}]}, &(0x7f0000f6bffb), 0x0, 0xfffffe21, &(0x7f00001a7f05)=""/251}, 0x18) [ 193.353950] sctp: failed to load transform for md5: -2 11:12:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x24}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0xffffff85, 0x7, 0x2, 0x1}]}, &(0x7f0000f6bffb), 0x0, 0xfffffe21, &(0x7f00001a7f05)=""/251}, 0x18) 11:12:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000340)="95181c8871fd14df9432cfd99090edb19cd1b1ffa8", 0x15) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local}, 0x8) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5a9, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1}, 0x10) 11:12:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0xffffffff00000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x7) 11:12:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xc, &(0x7f0000000100)=@req3, 0x1c) 11:12:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 193.566612] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:12:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) mlockall(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={0x0, 0x4}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) socket$unix(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 11:12:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) 11:12:22 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper={0x40406300}], 0x1, 0x0, &(0x7f0000000480)="f2"}) 11:12:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x11, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x3, &(0x7f0000000040), 0x730000) 11:12:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x10001}) pwritev(r0, &(0x7f0000002480)=[{&(0x7f0000000200), 0xc000}], 0x1, 0x0) 11:12:22 executing program 6: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f00000000c0)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="12"]}, 0x18}}, 0x0) 11:12:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 11:12:22 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x11, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x3, &(0x7f0000000040), 0x730000) [ 193.974312] hrtimer: interrupt took 134291 ns [ 193.974971] binder: 6509:6519 got transaction to context manager from process owning it [ 193.987277] binder: 6509:6519 transaction failed 29201/-22, size 0-0 line 2846 11:12:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000300), &(0x7f00000004c0)="848432503e1ac2bae9d92c5d144121fbb1962144eae8978bd4f065eadead9ca85fd3c49e925de4007488bf80a2152f25efb149bbddc4493ad0c625b2e5cfabf2f745b9a6586673f693fc49f3b2e10e38afb34f9befefa874c9e7033ccc0e967bec6de22d59ece236cb34ca95781888a02e9796e3342b40b123e5f81ff5e34b907efecba4cfbf634fd3fe7f546dba4cdcc4fe13ac83893eef8276820db8efd0e90729fb71a71d96dd945238acddb8375d4b349d571748902d266efb9ab909b8b6", 0xc0, r0) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0), &(0x7f0000000080)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000640)=""/155, 0x39, &(0x7f0000000600)={&(0x7f00000000c0)={'sha512-avx\x00'}, &(0x7f0000000000)}) 11:12:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x11, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x3, &(0x7f0000000040), 0x730000) [ 194.146676] binder_alloc: binder_alloc_mmap_handler: 6509 20001000-20004000 already mapped failed -16 [ 194.172989] binder: BINDER_SET_CONTEXT_MGR already set [ 194.178736] binder: 6509:6519 ioctl 40046207 0 returned -16 11:12:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) [ 194.197677] binder_alloc: 6509: binder_alloc_buf, no vma [ 194.203406] binder: 6509:6539 transaction failed 29189/-3, size 0-0 line 2970 [ 194.231150] binder: send failed reply for transaction 2 to 6509:6519 11:12:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="0a5cc80700315f85715070") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xc) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000000c0)) umount2(&(0x7f0000000100)='./file0\x00', 0x0) [ 194.258862] binder: undelivered TRANSACTION_COMPLETE [ 194.264296] binder: undelivered TRANSACTION_ERROR: 29189 11:12:23 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000080)=0x11, 0x4) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x3, &(0x7f0000000040), 0x730000) 11:12:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) [ 194.327344] binder: undelivered TRANSACTION_ERROR: 29189 11:12:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={&(0x7f00000000c0), 0xc, &(0x7f0000001280)={&(0x7f0000001200)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @dev}]}, 0x2c}}, 0x0) 11:12:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) mlockall(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={0x0, 0x4}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) socket$unix(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 11:12:23 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 11:12:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@loopback}, @in6=@local, {@in=@multicast1, @in6}, {{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}}, 0x128}, 0x8}, 0x0) 11:12:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) 11:12:23 executing program 6: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f00000000c0)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="12"]}, 0x18}}, 0x0) 11:12:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x10001}) pwritev(r0, &(0x7f0000002480)=[{&(0x7f0000000200), 0xc000}], 0x1, 0x0) 11:12:23 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a00090000000600004d9b0000000000007e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:12:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x1d, &(0x7f0000000080), 0x4) 11:12:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 194.915933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. 11:12:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x1d, &(0x7f0000000080), 0x4) 11:12:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) mlockall(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={0x0, 0x4}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) socket$unix(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 11:12:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) 11:12:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x1d, &(0x7f0000000080), 0x4) 11:12:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x1d, &(0x7f0000000080), 0x4) 11:12:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) mlockall(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socketpair(0x11, 0x6, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000003c0)={0x0, 0x4}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) socket$unix(0xa, 0x3, 0x3a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 11:12:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:24 executing program 6: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$binfmt_elf32(r0, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f00000000c0)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="12"]}, 0x18}}, 0x0) 11:12:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x10001}) pwritev(r0, &(0x7f0000002480)=[{&(0x7f0000000200), 0xc000}], 0x1, 0x0) 11:12:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:25 executing program 7: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6(0xa, 0x2001000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(r0, 0x111, 0x0, &(0x7f0000000300)=""/162, &(0x7f00000003c0)=0xa2) 11:12:25 executing program 6: r0 = socket(0x2, 0x1, 0x0) setsockopt(r0, 0x6, 0x20, &(0x7f00000002c0)="02000800", 0x4) 11:12:25 executing program 7: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r3}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 11:12:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:25 executing program 6: syz_emit_ethernet(0xff75, &(0x7f0000000080)={@random="3dc3fa871b11", @random="93d1842848c6", [], {@ipv6={0x86dd, {0x0, 0x6, "415c02", 0x44, 0x11, 0x0, @ipv4={[], [], @multicast2}, @local, {[], @gre}}}}}, 0x0) 11:12:25 executing program 0: mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/16, &(0x7f0000fae000)=0x10) 11:12:25 executing program 6: syz_emit_ethernet(0xff75, &(0x7f0000000080)={@random="3dc3fa871b11", @random="93d1842848c6", [], {@ipv6={0x86dd, {0x0, 0x6, "415c02", 0x44, 0x11, 0x0, @ipv4={[], [], @multicast2}, @local, {[], @gre}}}}}, 0x0) 11:12:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/packet\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r1, r0, &(0x7f0000000040)=0x38, 0x79ffffffffffff) 11:12:25 executing program 7: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)={0x28, 0x2}, 0x28) 11:12:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_mtu(r3, 0x0, 0x29, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8982, &(0x7f0000000000)={"060000003000", {0x2, 0x0, @remote}}) close(r3) dup3(r1, r2, 0x0) 11:12:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x10001}) pwritev(r0, &(0x7f0000002480)=[{&(0x7f0000000200), 0xc000}], 0x1, 0x0) 11:12:26 executing program 6: syz_emit_ethernet(0xff75, &(0x7f0000000080)={@random="3dc3fa871b11", @random="93d1842848c6", [], {@ipv6={0x86dd, {0x0, 0x6, "415c02", 0x44, 0x11, 0x0, @ipv4={[], [], @multicast2}, @local, {[], @gre}}}}}, 0x0) 11:12:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) 11:12:26 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000380)={0x4}) 11:12:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) add_key$user(&(0x7f0000002800)='user\x00', &(0x7f0000002840), &(0x7f0000002a00), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000002740)) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, &(0x7f0000002440), 0x2000005) 11:12:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14}, 0x14) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000040), 0xfd86) recvfrom(r1, &(0x7f0000003540)=""/68, 0x44, 0x0, &(0x7f0000003640)=@hci, 0x707000) 11:12:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="66b9800000c00f326635000800000f300f2325363e0f01cb66b9800000c00f326635002000000f30018c448b2e0f0171860fc72cba4200ed67f26cd0bf9f30", 0x3f}], 0x1, 0x0, &(0x7f0000000040), 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000100)={0x7}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:12:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x0, 0x9}) 11:12:26 executing program 6: syz_emit_ethernet(0xff75, &(0x7f0000000080)={@random="3dc3fa871b11", @random="93d1842848c6", [], {@ipv6={0x86dd, {0x0, 0x6, "415c02", 0x44, 0x11, 0x0, @ipv4={[], [], @multicast2}, @local, {[], @gre}}}}}, 0x0) 11:12:26 executing program 7: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000c60000)={{{@in, @in6=@local}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) getresgid(&(0x7f00000001c0), &(0x7f0000498000), &(0x7f0000843ffc)) 11:12:26 executing program 0: r0 = socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0xc, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:12:26 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000400000000000200000001000084811f01e10000001e000000150000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 11:12:26 executing program 7: r0 = socket(0x10, 0x20000000000003, 0x0) recvmmsg(r0, &(0x7f0000002bc0)=[{{&(0x7f0000000180)=@pppol2tpin6, 0x80, &(0x7f0000000280)=[{&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f0000000400)=""/144, 0x90}], 0x3, &(0x7f0000000600)=""/63, 0x3f}}], 0x1, 0x0, &(0x7f00000000c0)) recvmmsg(r0, &(0x7f0000002800)=[{{&(0x7f0000000100), 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/9, 0x9}}], 0x1, 0x0, &(0x7f0000002980)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f0000003080)={0x14, 0x1a, 0x201}, 0x14}}, 0x0) 11:12:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r1) 11:12:26 executing program 0: getgroups(0x2, &(0x7f0000000000)=[0xee00, 0xffffffffffffffff]) setregid(r0, 0x0) [ 197.762353] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 197.820487] REISERFS (device loop3): using ordered data mode [ 197.826471] reiserfs: using flush barriers 11:12:26 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) [ 197.893530] REISERFS warning (device loop3): sh-459 journal_init: unable to read journal header [ 197.966800] REISERFS warning (device loop3): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 198.039474] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 198.055916] REISERFS (device loop3): using ordered data mode [ 198.061831] reiserfs: using flush barriers [ 198.088199] REISERFS warning (device loop3): sh-459 journal_init: unable to read journal header [ 198.111148] REISERFS warning (device loop3): sh-2022 reiserfs_fill_super: unable to initialize journal space 11:12:27 executing program 0: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000000)={'raw\x00', 0x2}, 0x48) 11:12:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r1) 11:12:27 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000003c0)={0x11, 0x0, r1}, 0x14) sendto(r0, &(0x7f0000000000)="95653028705ba0ac8cbb688d275d484c16f677b7fd3e0a068309f10118121394ebfe", 0x22, 0x0, 0x0, 0x0) 11:12:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x8000000000000031, 0xffffffffffffffff, 0x0) rt_sigaction(0x12, &(0x7f0000000240), &(0x7f00000012c0), 0x8, &(0x7f0000001300)) 11:12:27 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000400000000000200000001000084811f01e10000001e000000150000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 11:12:27 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x1) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080)="34e30acd5e6981197fb871bfda3e12132ef163bd237f0ac772455f403994dfb5a33656c1909dbad3b48cea809963ff9265c85eb577701b67c1f6c3cf14fc6b334248f7fbf8ea0643", 0x48}]) 11:12:27 executing program 2: r0 = socket$inet6(0xa, 0x20002000000805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8982, &(0x7f0000000040)={@mcast1}) close(r2) close(r1) 11:12:27 executing program 7: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004e00)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="fa"], 0x1}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000004b80)=[{{&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000001300)="fbca306edec0dbe09874046fef554017988c48b2dbc11250a0761d38c907c8fb64d75afa7bbde3f428eb81482f9d189ace216908da7432c430fd2f63266850778a7d3b013167062a00cc7d92c09bf26873f358cd6ad18c5c5e01e17b712fe70a23c1f8314c3ea2c6c9eefce197fcfcae1dc94e09cacc31a79481db824865e40290bc16dbb1ed24bff9a96a7fb503f5ac194ec114dab6849e1aed24cb551663b16d150dd427370857e346f21dd53278d5e6303fb7835e76a2bea827a127472d105b70", 0xc2}], 0x1}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000080)=[{{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000000300), 0x0, &(0x7f0000000340)}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x4b8, &(0x7f0000000e40), 0x0, &(0x7f00000012c0), 0x302}}], 0x2, 0x0) 11:12:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r1) [ 198.651726] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 198.683345] REISERFS (device loop3): using ordered data mode [ 198.689334] reiserfs: using flush barriers 11:12:27 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)={[{@inode32='inode32'}, {@discard='discard'}]}) 11:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$SIOCGIFMTU(r2, 0x4008af21, &(0x7f0000000000)) close(0xffffffffffffffff) 11:12:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x2}}, 0x20) dup3(r0, r1, 0x0) [ 198.792516] REISERFS warning (device loop3): sh-459 journal_init: unable to read journal header 11:12:27 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xa5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040), 0x113, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) close(r1) 11:12:27 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0xa3, &(0x7f0000000100)="76b92cb4bdb33b9c7c614aba2ed8", &(0x7f0000000040)=""/163, 0xecc}, 0x28) [ 198.853128] REISERFS warning (device loop3): sh-2022 reiserfs_fill_super: unable to initialize journal space 11:12:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$SIOCGIFMTU(r2, 0x4008af21, &(0x7f0000000000)) close(0xffffffffffffffff) [ 198.928936] XFS (loop0): mounting with "discard" option, but the device does not support discard [ 198.996964] XFS (loop0): Mounting V4 Filesystem [ 199.058950] XFS (loop0): totally zeroed log [ 199.100585] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 199.110415] XFS (loop0): Unmount and run xfs_repair [ 199.115827] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 199.122558] 00000000473cd2ce: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.131466] 000000003230ffc9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.140360] 000000005c516725: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:28 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 11:12:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x5, 0x20, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) 11:12:28 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000400000000000200000001000084811f01e10000001e000000150000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) [ 199.149285] 00000000ec949228: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.158183] 00000000db1673c4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.167093] 00000000da155bcf: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.175990] 000000009696910a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.184941] 00000000cebd6f2f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:28 executing program 1: r0 = socket$inet6(0xa, 0x200080003, 0x8) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000005c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000009c0)="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", 0x100, r1) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000180), &(0x7f0000000700)='u', 0x1, r2) r5 = add_key$user(&(0x7f0000688000)='user\x00', &(0x7f0000000140), &(0x7f00000007c0)="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", 0x181, r3) r6 = request_key(&(0x7f0000a98ffb)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="2f6465612f7675746f66730719", 0x0) keyctl$dh_compute(0x17, &(0x7f00004c8ff4)={r4, r5, r6}, &(0x7f00005cd000), 0x0, &(0x7f000010c000)={&(0x7f0000bf4ff3)={'ghash-generic\x00'}, &(0x7f0000000000)}) 11:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$SIOCGIFMTU(r2, 0x4008af21, &(0x7f0000000000)) close(0xffffffffffffffff) [ 199.194084] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 199.203565] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 199.212944] XFS (loop0): Failed to read root inode 0x80, error 117 11:12:28 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x9, 0x5, 0x2}, 0x3e) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000280)}, 0x10) [ 199.247613] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal [ 199.289964] REISERFS (device loop3): using ordered data mode [ 199.295885] reiserfs: using flush barriers 11:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)={[{@inode32='inode32'}, {@discard='discard'}]}) [ 199.366369] REISERFS warning (device loop3): sh-459 journal_init: unable to read journal header [ 199.461839] REISERFS warning (device loop3): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 199.547129] XFS (loop0): mounting with "discard" option, but the device does not support discard [ 199.572170] XFS (loop0): Mounting V4 Filesystem [ 199.588468] XFS (loop0): totally zeroed log [ 199.595785] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 199.605431] XFS (loop0): Unmount and run xfs_repair [ 199.610578] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 199.617303] 000000003e190ae5: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.626253] 000000007b239997: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.635153] 0000000008c85380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.644061] 00000000bb62a2e6: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.652950] 00000000e4f868e9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.661862] 000000002713a3ed: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.670757] 00000000951a416d: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 199.679685] 000000004f8abe97: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:28 executing program 2: r0 = socket$inet6(0xa, 0x20002000000805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8982, &(0x7f0000000040)={@mcast1}) close(r2) close(r1) 11:12:28 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = open(&(0x7f0000011000)='./bus\x00', 0x8000400141042, 0x0) truncate(&(0x7f0000bec000)='./bus\x00', 0xda) truncate(&(0x7f0000000000)='./bus\x00', 0x5) mmap(&(0x7f0000000000/0x11000)=nil, 0x11000, 0x4, 0x11, r1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 11:12:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$SIOCGIFMTU(r2, 0x4008af21, &(0x7f0000000000)) close(0xffffffffffffffff) 11:12:28 executing program 6: socketpair$inet(0x1e, 0x80002, 0x0, &(0x7f0000000000)={0x0, 0x0}) shutdown(r0, 0x2) 11:12:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000280), 0x80000001) 11:12:28 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000400000000000200000001000084811f01e10000001e000000150000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000013900)) 11:12:28 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) [ 199.688739] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 199.698180] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 199.706792] XFS (loop0): Failed to read root inode 0x80, error 117 11:12:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)={[{@inode32='inode32'}, {@discard='discard'}]}) [ 199.809965] REISERFS (device loop3): found reiserfs format "3.5" with non-standard journal 11:12:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000280), 0x80000001) 11:12:28 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) 11:12:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r1}, 0x2c) [ 199.880486] REISERFS (device loop3): using ordered data mode [ 199.886418] reiserfs: using flush barriers 11:12:28 executing program 7: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x2000000001}, 0xb6) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00005c0fe0)={0x3}, 0x20) write(r0, &(0x7f0000ce6ffe)="da", 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180), 0x8) [ 199.971373] REISERFS warning (device loop3): sh-459 journal_init: unable to read journal header [ 200.000056] device veth0_to_bridge entered promiscuous mode 11:12:28 executing program 2: r0 = socket$inet6(0xa, 0x20002000000805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8982, &(0x7f0000000040)={@mcast1}) close(r2) close(r1) 11:12:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={"7465616d300000163694d900", 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x30, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_XDP={0x4, 0x2b, [@nested={0xc, 0x1, [@typed={0x8, 0x0, @fd}]}]}]}, 0x30}}, 0x0) [ 200.025043] REISERFS warning (device loop3): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 200.042545] ip6tnl0: mtu less than device minimum 11:12:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000280), 0x80000001) [ 200.077373] bond0: Releasing backup interface bond_slave_1 [ 200.145477] XFS (loop0): mounting with "discard" option, but the device does not support discard [ 200.172038] ip6tnl0: mtu less than device minimum [ 200.191084] XFS (loop0): Mounting V4 Filesystem [ 200.229153] XFS (loop0): totally zeroed log [ 200.238132] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 200.247852] XFS (loop0): Unmount and run xfs_repair [ 200.252942] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 200.259696] 00000000068ab8b2: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.268703] 000000003834813a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:29 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000600)='./file0/file0\x00', r0}, 0x10) umount2(&(0x7f0000000380)='./file0\x00', 0x0) 11:12:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000280), 0x80000001) [ 200.277593] 00000000d804fcca: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.286520] 00000000a47c4d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.290655] device veth0_to_bridge left promiscuous mode [ 200.295407] 00000000547238ef: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.295423] 00000000c3566b04: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.295435] 000000009b34d91c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:29 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000000000039a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) [ 200.295446] 000000005dce6386: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.302091] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 200.346086] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 200.354669] XFS (loop0): Failed to read root inode 0x80, error 117 11:12:29 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) 11:12:29 executing program 2: r0 = socket$inet6(0xa, 0x20002000000805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x30, &(0x7f0000000880)=ANY=[], 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8982, &(0x7f0000000040)={@mcast1}) close(r2) close(r1) 11:12:29 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) [ 200.497751] device veth0_to_bridge entered promiscuous mode 11:12:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000040)={[{@inode32='inode32'}, {@discard='discard'}]}) [ 200.538003] ip6tnl0: mtu less than device minimum 11:12:29 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000600)='./file0/file0\x00', r0}, 0x10) umount2(&(0x7f0000000380)='./file0\x00', 0x0) [ 200.566919] device veth0_to_bridge entered promiscuous mode [ 200.592566] ip6tnl0: mtu less than device minimum 11:12:29 executing program 1: r0 = getpid() ioprio_get$pid(0x1, r0) 11:12:29 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000600)='./file0/file0\x00', r0}, 0x10) umount2(&(0x7f0000000380)='./file0\x00', 0x0) 11:12:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0x3000, 0x5000}) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x4, 0x200, 0x4, 0x6c, 0x9d2, 0xffffffffffffff7f, 0x2, 0x273c, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000140)={r2, 0x2, 0x273, 0x3, 0x800, 0x1f}, &(0x7f0000000180)=0x14) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/93) timerfd_settime(r0, 0x1, &(0x7f0000000340)={{r3, r4+30000000}, {0x0, 0x1c9c380}}, &(0x7f0000000380)) flock(r0, 0x1) r5 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r5, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f760070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x21d) getegid() perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r6, 0x10e, 0x5, &(0x7f0000000040)=0x46b, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0x0, 0x2400) r7 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x3, 0x401, 0xffffffff}, 0xc) setsockopt$inet6_int(r7, 0x29, 0xc8, &(0x7f0000000280), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x3, @mcast2, 0x5}, {0xa, 0x4e20, 0x412, @mcast1, 0x100}, 0x8, [0x6, 0x1, 0x40000000000000, 0x2, 0x1ff, 0xfffffffffffffffc, 0x9955, 0x40]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote}}, 0x5c) 11:12:29 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) [ 200.697123] device veth0_to_bridge left promiscuous mode [ 200.705812] bond0: Releasing backup interface bond_slave_1 [ 200.823091] XFS (loop0): mounting with "discard" option, but the device does not support discard [ 200.866206] XFS (loop0): Mounting V4 Filesystem 11:12:29 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x30}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 11:12:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) syz_open_dev$sndctrl(&(0x7f00000002c0)='/dev/snd/controlC#\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) [ 200.900811] XFS (loop0): totally zeroed log 11:12:29 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8), &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000600)='./file0/file0\x00', r0}, 0x10) umount2(&(0x7f0000000380)='./file0\x00', 0x0) [ 200.935670] XFS (loop0): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 200.945405] XFS (loop0): Unmount and run xfs_repair [ 200.950498] XFS (loop0): First 128 bytes of corrupted metadata buffer: [ 200.957258] 00000000acfca39f: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.966180] 000000009cbcf3de: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.975072] 000000004dd2e66b: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.983985] 00000000f07d18a4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 200.992880] 0000000028646813: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 201.001785] 00000000c76cfe03: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 201.010702] 00000000a198aa85: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 201.019593] 00000000749de3d4: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 11:12:29 executing program 2: r0 = socket$inet6(0xa, 0x801, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") capset(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r1, &(0x7f0000000080)='\x00', 0x1, 0x4008000, &(0x7f00004daff0)={0x2, 0x0, @loopback}, 0x10) creat(&(0x7f0000000180)='./file0\x00', 0xa8) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendto$inet(r1, &(0x7f0000000140)='q', 0x1, 0x4000084, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) [ 201.028556] XFS (loop0): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 201.038022] XFS (loop0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 201.046628] XFS (loop0): Failed to read root inode 0x80, error 117 11:12:30 executing program 7: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000080)}}, &(0x7f0000000140)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) 11:12:30 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) connect$inet6(r1, &(0x7f0000000000), 0x1c) write$binfmt_misc(r1, &(0x7f00000013c0)={'syz1'}, 0x4) [ 201.200308] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) [ 201.235135] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:12:30 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a0a00ffffffff006b01"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000500)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000080)="1bef697c728000580000", 0x80000001, 0xbb, &(0x7f0000000300)=""/187}, 0x48) 11:12:30 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xc018ae85, 0xa07000) [ 201.602484] device veth0_to_bridge entered promiscuous mode [ 201.614157] ip6tnl0: mtu less than device minimum [ 201.622475] device veth0_to_bridge left promiscuous mode [ 201.641571] device veth0_to_bridge left promiscuous mode 11:12:30 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) 11:12:30 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)) 11:12:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) 11:12:30 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") 11:12:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x100000001, 0x8000000000000a2, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xc, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) dup2(r2, r1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000040)}, 0x10) 11:12:30 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) 11:12:30 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x3, @local, 'bond0\x00'}}, 0x1e) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8937, &(0x7f0000000040)={"626f6e64300000000000000000000100", r2}) 11:12:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) 11:12:30 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)) [ 201.823376] device veth0_to_bridge entered promiscuous mode [ 201.829756] device veth0_to_bridge entered promiscuous mode [ 201.860881] ip6tnl0: mtu less than device minimum [ 201.867595] ip6tnl0: mtu less than device minimum 11:12:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0xb3af) 11:12:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x7ffff000) 11:12:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) [ 201.967533] device veth0_to_bridge left promiscuous mode [ 201.981613] device veth0_to_bridge left promiscuous mode 11:12:30 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x6}, 0x10) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_ivalue}) ioctl$sock_ifreq(r1, 0x891e, &(0x7f0000000000)={'veth1_to_bridge\x00', @ifru_map={0x8, 0x0, 0x9, 0x8000, 0x100}}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x2140, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8088}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r2], 0x2}, 0x1, 0x0, 0x0, 0x20000841}, 0x20000040) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000000240)=@req) connect$netlink(r0, &(0x7f0000000040)=@unspec, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xffffffffffffae2c, &(0x7f0000000100)={0x77359400}) [ 202.117674] syz-executor5 (7132) used greatest stack depth: 15432 bytes left [ 202.172915] device veth0_to_bridge entered promiscuous mode [ 202.181059] ip6tnl0: mtu less than device minimum [ 202.204599] device veth0_to_bridge left promiscuous mode 11:12:32 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)) 11:12:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x7ffff000) 11:12:32 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8), &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 11:12:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) 11:12:32 executing program 5: seccomp(0x1, 0x2, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x4000000000006, 0x0, 0x0, 0x7ffff7ff00000}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 11:12:32 executing program 3: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@generic={0x0, 0x2, 0x8c1}) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x781041) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f00000000c0)) 11:12:32 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[]}}, 0x0) recvmsg(r1, &(0x7f00000001c0)={&(0x7f0000000000)=@generic, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=""/190, 0xbe}, 0x0) write(r1, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f51108000100020100020800038001000000", 0x24) 11:12:32 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:32 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)) [ 203.405526] audit: type=1326 audit(1534331552.307:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:32 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x7ffff000) [ 203.518259] audit: type=1326 audit(1534331552.332:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 203.538287] audit: type=1326 audit(1534331552.332:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:32 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8), &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 11:12:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc, &(0x7f000079bffc), &(0x7f0000000000)=0x4) [ 203.558269] audit: type=1326 audit(1534331552.333:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 203.578142] audit: type=1326 audit(1534331552.333:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 203.598025] audit: type=1326 audit(1534331552.334:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=16 compat=0 ip=0x457089 code=0x7ff00000 [ 203.617819] audit: type=1326 audit(1534331552.334:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 203.637712] audit: type=1326 audit(1534331552.334:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x34, 0x1) ppoll(&(0x7f0000000040)=[{r1}, {r1}, {r1, 0x301}], 0x3, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000100), 0x8) 11:12:32 executing program 5: seccomp(0x1, 0x2, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x4000000000006, 0x0, 0x0, 0x7ffff7ff00000}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 203.657708] audit: type=1326 audit(1534331552.334:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 203.677694] audit: type=1326 audit(1534331552.335:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7156 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:32 executing program 3: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@generic={0x0, 0x2, 0x8c1}) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x781041) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f00000000c0)) 11:12:41 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x7ffff000) 11:12:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8), &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 11:12:41 executing program 6: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x8000552c, &(0x7f0000000300)) 11:12:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)='0') 11:12:41 executing program 5: seccomp(0x1, 0x2, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x4000000000006, 0x0, 0x0, 0x7ffff7ff00000}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 11:12:41 executing program 3: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@generic={0x0, 0x2, 0x8c1}) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x781041) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f00000000c0)) 11:12:41 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) [ 212.700370] kauditd_printk_skb: 277 callbacks suppressed [ 212.700384] audit: type=1326 audit(1534331561.602:290): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.726171] audit: type=1326 audit(1534331561.603:291): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:41 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 212.746263] audit: type=1326 audit(1534331561.603:292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.766287] audit: type=1326 audit(1534331561.603:293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.786329] audit: type=1326 audit(1534331561.603:294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.806356] audit: type=1326 audit(1534331561.603:295): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.826406] audit: type=1326 audit(1534331561.603:296): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:41 executing program 0: syz_emit_ethernet(0x642, &(0x7f0000000100)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x223, 0x2b, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x634]}, @local, {[], @tcp={{0x2, 0x253, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 212.846429] audit: type=1326 audit(1534331561.603:297): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 [ 212.866472] audit: type=1326 audit(1534331561.603:298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:41 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x101}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 212.886506] audit: type=1326 audit(1534331561.603:299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7220 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457089 code=0x7ff00000 11:12:41 executing program 3: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@generic={0x0, 0x2, 0x8c1}) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x2, 0x781041) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f00000000c0)) 11:12:41 executing program 5: seccomp(0x1, 0x2, &(0x7f0000016000)={0x1, &(0x7f00001e0fe8)=[{0x4000000000006, 0x0, 0x0, 0x7ffff7ff00000}]}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 11:12:41 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x14) 11:12:41 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xfd) 11:12:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8), &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 11:12:42 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0x0, 0x0, 0x1}}, 0x5) 11:12:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1bd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7ffa, 0x0, 0x201a7fd7, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x6, 0x2ed, &(0x7f00001a7f05)=""/251}, 0x48) 11:12:42 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x14) 11:12:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f00000001c0)=""/4, &(0x7f0000000240)=0x4) 11:12:42 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xfd) 11:12:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000012e30)={0x14, 0x15, 0x301, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 11:12:42 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:50 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000002, 0x0) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffff7) fcntl$setstatus(r0, 0x4, 0x800) ioctl$int_in(r0, 0xc0000800005001, &(0x7f0000000000)) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0x18) 11:12:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0x0, 0x0, 0x1}}, 0x5) 11:12:50 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2, 0x100000002132, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xc812, r1, 0x0) r2 = dup(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x14) 11:12:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x48, 0x25}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x7a}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0xfdbb, &(0x7f000000cf3d)=""/195}, 0x48) 11:12:50 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:12:50 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xfd) 11:12:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000009680)=[{{&(0x7f0000004bc0)=@hci, 0x80, &(0x7f0000004cc0), 0x0, &(0x7f0000004d00)=[{0x408, 0x1, 0x1, "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"}], 0x408}}], 0x1, 0x0) 11:12:50 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x3}}, 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x2, 0x1a}, 0x20) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0)=0x10, 0x4) recvmmsg(r1, &(0x7f0000008400)=[{{&(0x7f00000081c0)=@l2, 0x80, &(0x7f00000082c0), 0x0, &(0x7f0000008300)=""/231, 0xe7}}], 0x1, 0x0, &(0x7f0000008640)) 11:12:50 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000015c0)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000001000000000006000000000000000001040000000000e00000010020000000000000000035000000000000000000000000ff00000000030009001cc832700001008200000400000105dec2c01de644b40003000500000000000200423b1d632b010020000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001680), 0x4) 11:12:50 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0x0, 0x0, 0x1}}, 0x5) 11:12:51 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000440)={0x1f, {0x0, 0x0, 0x1}}, 0x5) 11:12:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:12:51 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000100), 0xfd) 11:12:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000001440)='btrfs\x00', &(0x7f0000001480)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000001780)={[{@subvol={'subvol', 0x3d, '('}}, {@subvol={'subvol', 0x3d, '$cgroup'}}]}) 11:12:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x3, 0x73d}, 0x29b) write$binfmt_elf32(r1, &(0x7f0000001700)=ANY=[@ANYBLOB="7f"], 0x1) r2 = dup2(r1, r1) sendto$inet6(r1, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0x1000) recvmmsg(r1, &(0x7f0000006400)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/121, 0x79}], 0x1, &(0x7f0000000640)=""/190, 0xbe}}], 0x1, 0x0, &(0x7f0000006540)) 11:12:51 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:00 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:00 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:00 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:00 executing program 7: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:00 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000015c0)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000001000000000006000000000000000001040000000000e00000010020000000000000000035000000000000000000000000ff00000000030009001cc832700001008200000400000105dec2c01de644b40003000500000000000200423b1d632b010020000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001680), 0x4) 11:13:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:13:00 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:01 executing program 3: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:01 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:13:02 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000015c0)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000001000000000006000000000000000001040000000000e00000010020000000000000000035000000000000000000000000ff00000000030009001cc832700001008200000400000105dec2c01de644b40003000500000000000200423b1d632b010020000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001680), 0x4) 11:13:02 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:13:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:03 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:03 executing program 6: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000015c0)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000001000000000006000000000000000001040000000000e00000010020000000000000000035000000000000000000000000ff00000000030009001cc832700001008200000400000105dec2c01de644b40003000500000000000200423b1d632b010020000000"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000001680), 0x4) 11:13:03 executing program 7: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr-camellia-aesni,hmac(md4-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000140), 0x4) 11:13:03 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="6367726f757032007228bd0805723570aa0af79485aca52dc2d78e6e0837a4c041ed7c4ed979d62a636345c892647189e19fdeb2fe4e69daadbcac4a7636a3b430a7d3a0c4c3e87e72897a3bc7d8433e71d47d67c4b69dcdac061c950ce7d99bbb01fa08b4a4d7d5a5f9a00000000000eb7d40657c0e23aaecd4a17a4b9138c39f48eec31910b05395b9253ea42e79f28dada69e7b65663f7a6ca32edaa331aee72587e77d80b63ce88f8930056ca6b83a7880b6b2725f6a0636a71d1246fc9dfa824920e8ca9bf743e92534eb88a4ad356359a354b01a04db0b3c7a5d74fe2d495eaae8a5b8bf17b6af014f802926257a932c3e620d2ca8658c8f9a79aee239baa4e9912ccbe50da0a9382ca53a5c5ee79bd17b533c9bc22333465eccde63b67890753aeebb746ac693e5c5bb3abb4c7568bd98cb5b82ce90a954d7", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:04 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:04 executing program 4: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000427000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000356000/0x2000)=nil) 11:13:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4309(ccm(serpent-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="938ae4253a292623b900b1c3ee4de130665a3c44d363204f9f1efb3df92be539ce44ddf8", 0x24) 11:13:06 executing program 6: request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040), &(0x7f0000000080)='-,!\x00', 0x0) 11:13:06 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) 11:13:06 executing program 5: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:06 executing program 1: getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x400001ff}, &(0x7f000000affc)=0x20) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000ff8)) sigaltstack(&(0x7f0000001000/0x1000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f00000001c0)) 11:13:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x0, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x5fd}, &(0x7f0000000040)=0x14) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x700, 0x0, @fd}]}]}, 0x24c}}, 0x0) [ 237.355636] sctp: [Deprecated]: syz-executor6 (pid 7605) Use of struct sctp_assoc_value in delayed_ack socket option. [ 237.355636] Use struct sctp_sack_info instead 11:13:06 executing program 7: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="21299400", 0xffffffffffffffff) sendmsg(r3, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)="e0309f7380a5575eafd999336276f22162c7373015e593742ae11d49dc866b6d86ea73b0e0de3dc7ef1fcfe8ba11c3be9a50826392bae9a3747fb46530ae32f251f5deee404048f7c326ce01bef5c8ed6c3f52b8db22d4062c2de4b2acd03e87d11d5824105223d92a0e765114c789a33de1aa919540b1ae8ee0ce32a48a0bbfe3", 0x81}], 0x1, &(0x7f0000001640)=[{0x90, 0x11f, 0x0, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6d850a57e9d24b8f202f1"}], 0x90, 0x4000}, 0x40) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r5, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) [ 237.439836] sctp: [Deprecated]: syz-executor6 (pid 7605) Use of struct sctp_assoc_value in delayed_ack socket option. [ 237.439836] Use struct sctp_sack_info instead 11:13:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x40, 0xa9, 0x5, 0x1, 0x1}, 0x2c) 11:13:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x700, 0x0, @fd}]}]}, 0x24c}}, 0x0) 11:13:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000d40)=0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) close(r0) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140), 0x700000000000}]) 11:13:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x700, 0x0, @fd}]}]}, 0x24c}}, 0x0) 11:13:07 executing program 6: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001ac0), 0x0, &(0x7f0000001bc0)={[{@swidth={'swidth', 0x3d, 0x8}}, {@sunit={'sunit', 0x3d, 0x1}}]}) 11:13:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000002340)=""/246) dup3(r1, r2, 0x0) 11:13:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2000000) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 11:13:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_mtu(r3, 0x0, 0x29, &(0x7f0000000040), &(0x7f0000000000)=0x4) ioctl$sock_inet_SIOCGARP(r3, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @loopback}, {0xfffffffffffffffd, @local}, 0xff0f, {0x2, 0x0, @remote}, 'team_slave_1\x00'}) close(r3) dup3(r1, r2, 0x0) 11:13:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x700, 0x0, @fd}]}]}, 0x24c}}, 0x0) 11:13:07 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/153, 0xf}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/120, 0x78}}, {{&(0x7f00000059c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000006040)}}], 0x2, 0x0, 0x0) 11:13:07 executing program 2: r0 = socket(0x11, 0x4800000000080003, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00001fb000)={'vcan0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000040)="2d67fcffffff000000000bbc256011b0", 0x10, 0x0, &(0x7f0000000000)={0x11, 0xc, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 11:13:07 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x70c000) 11:13:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(r1, &(0x7f0000000180)='v', 0x1) sendfile(r2, r3, 0x0, 0x5a92) [ 238.890793] XFS (loop6): Invalid superblock magic number 11:13:07 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8c442, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x400bebf) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x40086602, &(0x7f0000000000)=r1) write$FUSE_LK(r0, &(0x7f0000000180)={0x28}, 0x28) 11:13:07 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49}}, 0x14) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) semctl$IPC_RMID(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)}], 0x1, &(0x7f0000001640)=[{0x80, 0x11f, 0x7, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6"}], 0x80}, 0x40) socket(0x10, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r1, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:07 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/anycast6\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000019c0)={@remote}, 0x175) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000001c0)={@dev}, 0x14) preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/94, 0x5e}, {&(0x7f0000000300)=""/233, 0xe9}], 0x2, 0x0) 11:13:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:07 executing program 6: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001ac0), 0x0, &(0x7f0000001bc0)={[{@swidth={'swidth', 0x3d, 0x8}}, {@sunit={'sunit', 0x3d, 0x1}}]}) 11:13:07 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='.\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b66306bc86cb448f0000800000000000000040000000000000e37f000000000000008100000000000000820000000100001000000000010000000000000000b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000080)=ANY=[]) 11:13:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x10000009, 0x21, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400004, 0x0, 0x811, r2, 0x0) 11:13:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x10000000000062) read(r1, &(0x7f0000000040)=""/11, 0xffffff3a) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000500)=0x2) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 11:13:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_stats={0x7}}) close(r2) close(r1) [ 239.319573] XFS (loop6): Invalid superblock magic number [ 239.360788] XFS (loop0): no log defined [ 239.365066] XFS (loop0): Internal error xfs_mountfs at line 869 of file fs/xfs/xfs_mount.c. Caller xfs_fs_fill_super+0xe21/0x16a0 [ 239.377041] CPU: 1 PID: 7732 Comm: syz-executor0 Not tainted 4.18.0-next-20180814+ #39 [ 239.385119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.394497] Call Trace: [ 239.397131] dump_stack+0x1c9/0x2b4 [ 239.400790] ? dump_stack_print_info.cold.2+0x52/0x52 [ 239.406019] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 239.411603] ? xfs_fs_fill_super+0xe21/0x16a0 [ 239.416132] xfs_error_report+0xb2/0xc0 [ 239.420136] ? xfs_fs_fill_super+0xe21/0x16a0 [ 239.424692] xfs_mountfs+0x17f9/0x1f00 [ 239.428623] ? xfs_default_resblks+0x60/0x60 [ 239.433098] ? xfs_mru_cache_uninit+0x20/0x20 [ 239.437624] ? xfs_readsb+0x35f/0x5f0 [ 239.441482] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 239.446535] ? set_blocksize+0x2c1/0x340 [ 239.450635] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 239.456230] ? xfs_setsize_buftarg+0x269/0x390 [ 239.460862] xfs_fs_fill_super+0xe21/0x16a0 [ 239.465239] ? xfs_test_remount_options+0x90/0x90 [ 239.470126] ? snprintf+0xae/0xe0 [ 239.473615] ? vsprintf+0x40/0x40 [ 239.477136] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 239.482197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.487785] mount_bdev+0x314/0x3e0 [ 239.491444] ? xfs_test_remount_options+0x90/0x90 [ 239.496331] xfs_fs_mount+0x3c/0x50 [ 239.499994] ? xfs_finish_flags+0x480/0x480 [ 239.504338] legacy_get_tree+0x131/0x460 [ 239.508574] vfs_get_tree+0x1cb/0x5c0 [ 239.512410] do_mount+0x6f9/0x1e30 [ 239.515976] ? rcu_is_watching+0x8c/0x150 [ 239.520155] ? trace_hardirqs_on+0xbd/0x2c0 [ 239.524513] ? copy_mount_string+0x40/0x40 [ 239.528777] ? copy_mount_options+0x5f/0x380 [ 239.533229] ? kmem_cache_alloc_trace+0x324/0x730 [ 239.538112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.543829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.549401] ? copy_mount_options+0x285/0x380 [ 239.553925] ksys_mount+0x12d/0x140 [ 239.557590] __x64_sys_mount+0xbe/0x150 [ 239.561594] do_syscall_64+0x1b9/0x820 [ 239.565506] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 239.570891] ? syscall_return_slowpath+0x5e0/0x5e0 [ 239.575836] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 239.580869] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 239.585903] ? recalc_sigpending_tsk+0x180/0x180 [ 239.590691] ? kasan_check_write+0x14/0x20 [ 239.594953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 239.599824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.605027] RIP: 0033:0x459aba [ 239.608244] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 239.627225] RSP: 002b:00007f5c36427a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 239.634951] RAX: ffffffffffffffda RBX: 00007f5c36427b30 RCX: 0000000000459aba [ 239.642238] RDX: 00007f5c36427ad0 RSI: 0000000020000100 RDI: 00007f5c36427af0 [ 239.649521] RBP: 0000000020000100 R08: 00007f5c36427b30 R09: 00007f5c36427ad0 11:13:08 executing program 6: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001ac0), 0x0, &(0x7f0000001bc0)={[{@swidth={'swidth', 0x3d, 0x8}}, {@sunit={'sunit', 0x3d, 0x1}}]}) 11:13:08 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000636000)=0x2, 0x4) [ 239.656935] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 239.664223] R13: 0000000000000000 R14: 00000000004c9d42 R15: 0000000000000000 11:13:08 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:08 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/153, 0xf}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/120, 0x78}}, {{&(0x7f00000059c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000006040)}}], 0x2, 0x0, 0x0) 11:13:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x10000000000062) read(r1, &(0x7f0000000040)=""/11, 0xffffff3a) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000500)=0x2) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) [ 239.910617] XFS (loop6): Invalid superblock magic number 11:13:09 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49}}, 0x14) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) semctl$IPC_RMID(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)}], 0x1, &(0x7f0000001640)=[{0x80, 0x11f, 0x7, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6"}], 0x80}, 0x40) socket(0x10, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r1, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="300000002000010400000021000000000200000000000008000b000000000008000f0000000000180000000000000000165ea11319a05b6a47fe38a4b8be8751255f776ba6e6126df28f6abe41c4e18d41ea1c2dbbab55d94fa58b2a708ef2e7510ca763992a1c20f78131570f025333300da2ce1828e0c8999195fe3535e00139209dcad484552688016c8043b0792adf56ee008768e2bee123f9d6973c53b59848e4583d66ade0cf2e819fd5e7d8c6c26d74b2431c976d5210d6806ab42ca82884d01a0b9a42b9ad9a71a9db1d333770d2a1b214f7ffff49955388c641d9f3a8fb3cffffffff13734ad9985ecc34ae40324a909cb2cf371d8726df1742318db038592449adadf22f19d341409bd3f732b4fcb869ade9b7d13a48ca0a81be2171f7229d898ba524af44bfced51b464c275e28930198e3a3d176e83cdec18bb5f74059f3a3d995c9"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x10000000000062) read(r1, &(0x7f0000000040)=""/11, 0xffffff3a) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000500)=0x2) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 11:13:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:09 executing program 6: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001ac0), 0x0, &(0x7f0000001bc0)={[{@swidth={'swidth', 0x3d, 0x8}}, {@sunit={'sunit', 0x3d, 0x1}}]}) 11:13:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x10000009, 0x21, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400004, 0x0, 0x811, r2, 0x0) [ 240.645942] XFS (loop6): Invalid superblock magic number 11:13:09 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/153, 0xf}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/120, 0x78}}, {{&(0x7f00000059c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000006040)}}], 0x2, 0x0, 0x0) 11:13:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:10 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49}}, 0x14) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) semctl$IPC_RMID(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)}], 0x1, &(0x7f0000001640)=[{0x80, 0x11f, 0x7, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6"}], 0x80}, 0x40) socket(0x10, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r1, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000180)=0x10000000000062) read(r1, &(0x7f0000000040)=""/11, 0xffffff3a) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000500)=0x2) r2 = syz_open_pts(r1, 0x0) dup3(r0, r1, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) 11:13:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x10000009, 0x21, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400004, 0x0, 0x811, r2, 0x0) 11:13:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="300000002000010400000021000000000200000000000008000b000000000008000f0000000000180000000000000000165ea11319a05b6a47fe38a4b8be8751255f776ba6e6126df28f6abe41c4e18d41ea1c2dbbab55d94fa58b2a708ef2e7510ca763992a1c20f78131570f025333300da2ce1828e0c8999195fe3535e00139209dcad484552688016c8043b0792adf56ee008768e2bee123f9d6973c53b59848e4583d66ade0cf2e819fd5e7d8c6c26d74b2431c976d5210d6806ab42ca82884d01a0b9a42b9ad9a71a9db1d333770d2a1b214f7ffff49955388c641d9f3a8fb3cffffffff13734ad9985ecc34ae40324a909cb2cf371d8726df1742318db038592449adadf22f19d341409bd3f732b4fcb869ade9b7d13a48ca0a81be2171f7229d898ba524af44bfced51b464c275e28930198e3a3d176e83cdec18bb5f74059f3a3d995c9"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:11 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)=""/153, 0xf}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x2, &(0x7f0000000340)=""/120, 0x78}}, {{&(0x7f00000059c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000006040)}}], 0x2, 0x0, 0x0) 11:13:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:11 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49}}, 0x14) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) semctl$IPC_RMID(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x0, @local, 0x9}}}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000540)}], 0x1, &(0x7f0000001640)=[{0x80, 0x11f, 0x7, "1f715ab13801b6fe2dc8bb30446b812223cb0fd19db97a09d809297739c52cdd7ce1efab9d634c1450d1265957ef0f7fe3bdfadc5e15918d9ab872979f4331b8bc61a497e8768a9328728c3b1c5a72efcbbbd27f4ade686fb4250ee65f920d4507e9f7faab953b88881b170f48b96fc6"}], 0x80}, 0x40) socket(0x10, 0x3, 0xa) r1 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r1, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) 11:13:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="42e02b9a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f"], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x10000009, 0x21, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400004, 0x0, 0x811, r2, 0x0) 11:13:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="300000002000010400000021000000000200000000000008000b000000000008000f0000000000180000000000000000165ea11319a05b6a47fe38a4b8be8751255f776ba6e6126df28f6abe41c4e18d41ea1c2dbbab55d94fa58b2a708ef2e7510ca763992a1c20f78131570f025333300da2ce1828e0c8999195fe3535e00139209dcad484552688016c8043b0792adf56ee008768e2bee123f9d6973c53b59848e4583d66ade0cf2e819fd5e7d8c6c26d74b2431c976d5210d6806ab42ca82884d01a0b9a42b9ad9a71a9db1d333770d2a1b214f7ffff49955388c641d9f3a8fb3cffffffff13734ad9985ecc34ae40324a909cb2cf371d8726df1742318db038592449adadf22f19d341409bd3f732b4fcb869ade9b7d13a48ca0a81be2171f7229d898ba524af44bfced51b464c275e28930198e3a3d176e83cdec18bb5f74059f3a3d995c9"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') [ 242.584289] IPVS: ftp: loaded support on port[0] = 21 11:13:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="42e02b9a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f"], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:12 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x100000005, 0x0, 0x5000, 0x1000, &(0x7f000001d000/0x1000)=nil}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f000001a000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f00000001c0), 0x1000000000000255) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:13:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="42e02b9a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f"], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:12 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000140), 0x1100) 11:13:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000000)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="42e02b9a"], 0x4) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001380)=ANY=[@ANYBLOB="f10f"], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:13:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') [ 244.081810] IPVS: ftp: loaded support on port[0] = 21 [ 245.452564] device bridge_slave_1 left promiscuous mode [ 245.458705] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.486942] device bridge_slave_0 left promiscuous mode [ 245.492443] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.676831] team0 (unregistering): Port device team_slave_1 removed [ 247.687288] team0 (unregistering): Port device team_slave_0 removed [ 247.698050] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 247.711862] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 247.739396] bond0 (unregistering): Released all slaves [ 248.205419] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.211846] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.229271] device bridge_slave_0 entered promiscuous mode [ 248.239012] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.245411] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.260943] device bridge_slave_0 entered promiscuous mode [ 248.308541] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.314959] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.324050] device bridge_slave_1 entered promiscuous mode [ 248.332984] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.339396] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.354837] device bridge_slave_1 entered promiscuous mode [ 248.402322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.411617] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 248.471389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.483648] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 248.606605] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.676792] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 248.686490] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.733782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 248.805359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.812471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 248.819391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.839558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.894079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 248.901018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.987825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.002369] team0: Port device team_slave_0 added [ 249.047194] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.061555] team0: Port device team_slave_1 added [ 249.102784] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.111962] team0: Port device team_slave_0 added [ 249.120195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.180174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.197886] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.212960] team0: Port device team_slave_1 added [ 249.220577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.233435] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.252967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.286316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.309528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.316799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.328876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.353549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.394320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.401622] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.410543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.448970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.456160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.464639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.417928] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.424344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.431036] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.437443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.445115] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.739013] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.745433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.752128] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.758520] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.766026] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 250.921725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.928923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 251.407741] device bridge_slave_1 left promiscuous mode [ 251.413365] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.436172] device bridge_slave_0 left promiscuous mode [ 251.441802] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.620598] team0 (unregistering): Port device team_slave_1 removed [ 253.631051] team0 (unregistering): Port device team_slave_0 removed [ 253.641504] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 253.658611] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 253.685687] bond0 (unregistering): Released all slaves [ 255.517585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.647051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.725330] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.814882] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 255.887046] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.893479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.909291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.957989] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.964437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.971747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.047761] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.099345] 8021q: adding VLAN 0 to HW filter on device team0 11:13:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x2276) 11:13:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x9, 0x12) 11:13:25 executing program 4: r0 = socket$inet6(0xa, 0x1000200000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 11:13:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000da8ffc), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000340), 0x8) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x0) 11:13:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb64c86d6b66732e66617400020441000500077008f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x3fffa, 0x0) fstatfs(r0, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) utime(&(0x7f0000001880)='./file0\x00', &(0x7f0000000440)={0xffffffff, 0x91c2}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000400)="db1050c922", 0x5) r2 = socket(0x10, 0x2, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000001840)='./file0\x00', &(0x7f0000000580)='ubifs\x00', 0x1003, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r4 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0xffffffff, 0x2, 0x1, 0x9501, 0x0, 0xffffffffffff4aa9, 0x20, 0x1, 0x100000000, 0x100000000, 0xfffffffffffff5ad, 0x8000, 0x8, 0x20, 0x7, 0x80000001, 0x13d, 0x7fff, 0x0, 0x7f, 0x3, 0x6, 0x6, 0x5, 0x6, 0x74, 0xb9a4, 0x0, 0x8000, 0x7fff, 0x40, 0x6188, 0x100000000, 0x2, 0x3, 0x6ec, 0x0, 0x1, 0x4, @perf_config_ext={0x8, 0x7}, 0x240, 0x1, 0xfffffffffffff35d, 0x7, 0xea7, 0xffff, 0x7}, r4, 0x9, r0, 0x1) mount(&(0x7f0000377ff8)='.', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x5013, &(0x7f0000000500)="8f2ef1dafa31894a239d26783696ef83b3393c672534b55914241ec4029c61cccabda854d9194aabc7b022ff0b7d2cbc2c7ffc0a2b9b21f89564ab98733952cbef47be3b59ff722795") r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r2, r5, &(0x7f0000000000), 0x80000002) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r7 = getegid() fchown(r6, 0x0, r7) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000015c0)={@in6={{0xa, 0x4e22, 0x2, @remote, 0x4}}, 0x6, 0x9, 0xfd, "96c1ba742ddc1c664a1929edecdd05b31b3d084e1b7074d8f7d08a56656d21866825899e97d0ce22528bc8df547ebfe78b59265ce2a784bc0be6bd632bed5d075297feee3f57ddea54db110dff56c08a"}, 0xd8) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)='./file0\x00') 11:13:25 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000004c0)=""/216) 11:13:25 executing program 0: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1, 0x6}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000100)=""/16, &(0x7f0000000000)=0x10) 11:13:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrlimit(0x0, &(0x7f0000000580)) 11:13:26 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000004c0)=""/216) [ 257.123395] netlink: 'syz-executor4': attribute type 15 has an invalid length. 11:13:26 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 11:13:26 executing program 4: r0 = socket$inet6(0xa, 0x1000200000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 11:13:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) vmsplice(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) 11:13:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000200)='maps\x00') syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/pid\x00') 11:13:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = memfd_create(&(0x7f0000000100)="885d292b00", 0x0) write(r4, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000002, 0x20012, r4, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffeab) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, r6+10000000}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r5, 0x1000000000016) dup2(r1, r3) 11:13:26 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000004c0)=""/216) [ 257.358403] netlink: 'syz-executor4': attribute type 15 has an invalid length. 11:13:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000480)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) 11:13:26 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10) 11:13:26 executing program 4: r0 = socket$inet6(0xa, 0x1000200000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 11:13:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) ptrace(0x4207, r2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000000)) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x82}) [ 257.561990] netlink: 'syz-executor4': attribute type 15 has an invalid length. 11:13:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0xfa) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:13:26 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000004c0)=""/216) 11:13:26 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x437, &(0x7f0000000700)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) 11:13:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000003c0)=@random={'security.', 'user_id'}) 11:13:26 executing program 4: r0 = socket$inet6(0xa, 0x1000200000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x1000080003, 0x0) sendmsg(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000001800030007fffd946fa283bc8020000000040005031d856813000f00083c14cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) 11:13:26 executing program 0: syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 11:13:26 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 11:13:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x22, &(0x7f0000000000)={0x1, 0x20000, 0x1}, 0x10) [ 257.736643] netlink: 'syz-executor4': attribute type 15 has an invalid length. 11:13:26 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(0xffffffffffffffff) close(r0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c95d9d47e4635c995b18ba766a818648cd01f2e3825bee3eb373769cb2c85d7f0bb3aff58d31b0352895601ee239883abfad45a0e8c0f59bf3b52edf3500bb"}, 0x60, &(0x7f0000002600)}], 0x1, 0x0) 11:13:26 executing program 4: r0 = socket$netlink(0xa, 0x6, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10d, 0xf, &(0x7f0000001ffc), 0xe69a333) 11:13:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:27 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) 11:13:27 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) ftruncate(r0, 0x1000000) finit_module(r0, &(0x7f0000000080)='b\n\x00', 0x0) 11:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001140)={&(0x7f0000000080), 0xc, &(0x7f0000001100)={&(0x7f0000001300)={0x20, r3, 0xd05, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r4}, {0x4}}]}, 0x20}}, 0x0) 11:13:27 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000003c0), 0x10) bind$can_raw(r0, &(0x7f0000000540), 0x10) 11:13:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x35, 0x0, 0x4000000000401}, {}, {0x6}]}, 0x10) 11:13:27 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 11:13:27 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(0xffffffffffffffff) close(r0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c95d9d47e4635c995b18ba766a818648cd01f2e3825bee3eb373769cb2c85d7f0bb3aff58d31b0352895601ee239883abfad45a0e8c0f59bf3b52edf3500bb"}, 0x60, &(0x7f0000002600)}], 0x1, 0x0) 11:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001140)={&(0x7f0000000080), 0xc, &(0x7f0000001100)={&(0x7f0000001300)={0x20, r3, 0xd05, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r4}, {0x4}}]}, 0x20}}, 0x0) 11:13:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") seccomp(0x1, 0x0, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6, 0x0, 0x0, 0x407ffffffd}]}) timer_create(0x3, &(0x7f0000044000)={0x0, 0x0, 0x1}, &(0x7f0000000000)) exit(0x0) timer_delete(0x0) 11:13:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x14, 0x0, 0x2, 0x3}, 0x14}}, 0x0) 11:13:27 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/209}, {&(0x7f0000000380)=""/242}], 0x10000000000002a1, 0x0) 11:13:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_FSGETXATTR(r1, 0x40086610, &(0x7f0000000040)) [ 258.714652] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001140)={&(0x7f0000000080), 0xc, &(0x7f0000001100)={&(0x7f0000001300)={0x20, r3, 0xd05, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r4}, {0x4}}]}, 0x20}}, 0x0) 11:13:27 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(0xffffffffffffffff) close(r0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c95d9d47e4635c995b18ba766a818648cd01f2e3825bee3eb373769cb2c85d7f0bb3aff58d31b0352895601ee239883abfad45a0e8c0f59bf3b52edf3500bb"}, 0x60, &(0x7f0000002600)}], 0x1, 0x0) 11:13:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000200)=@known='trusted.syz\x00') [ 258.830288] EXT4-fs warning (device sda1): ext4_resize_fs:1916: can't read last block, resize aborted 11:13:27 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:27 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) r3 = gettid() ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) [ 258.888085] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000001140)={&(0x7f0000000080), 0xc, &(0x7f0000001100)={&(0x7f0000001300)={0x20, r3, 0xd05, 0x0, 0x0, {0x2}, [{{0x8, 0x1, r4}, {0x4}}]}, 0x20}}, 0x0) 11:13:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") 11:13:27 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6c, 0x0, @remote={0xac, 0x213}, @local, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, &(0x7f00000002c0)) [ 259.042309] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 259.067212] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.091165] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000c40)='btrfs\x00', &(0x7f0000000c80)='./file0\x00', 0x0, 0x0, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)) 11:13:28 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r1, &(0x7f0000000080), 0x153, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000), 0x1e6}], 0x1) close(0xffffffffffffffff) close(r0) sendmmsg$nfc_llcp(0xffffffffffffffff, &(0x7f00000026c0)=[{&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "c95d9d47e4635c995b18ba766a818648cd01f2e3825bee3eb373769cb2c85d7f0bb3aff58d31b0352895601ee239883abfad45a0e8c0f59bf3b52edf3500bb"}, 0x60, &(0x7f0000002600)}], 0x1, 0x0) 11:13:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) [ 259.274335] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x4]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x80}}, 0x0) 11:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="67a0"], 0x2) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 11:13:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000280), 0x4) r2 = socket$inet6(0xa, 0x80003, 0xfc) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) 11:13:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, &(0x7f0000000200)) 11:13:28 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:28 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000480)="0a5cc80700315f85715070") move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 259.592463] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 259.624188] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:28 executing program 1: unshare(0x8000000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) unshare(0xc000000) 11:13:28 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) r3 = gettid() ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 11:13:28 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2b0) 11:13:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x2a, &(0x7f0000000180)=0x1, 0x4) sendmmsg(r1, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)='#', 0x1}], 0x1}}], 0x1, 0x0) recvmsg(r2, &(0x7f0000001280)={&(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001180)=""/216, 0xd8}, 0x2) close(r1) 11:13:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000cecffc), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000840)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000007c0)=""/75, 0x4b}, 0x0) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000080)=""/1, 0x1}, 0x0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000008340)={&(0x7f0000000100), 0xc, &(0x7f0000008300)={&(0x7f0000007f00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0x238) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000001c0)) 11:13:28 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000003380)=[{{0x0, 0x0, &(0x7f00000020c0), 0x0, &(0x7f0000002100)=[{0x10, 0x10d, 0x2}], 0x10}}], 0x1, 0x0) 11:13:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) open$dir(&(0x7f0000000180)='./file0/file0\x00', 0x189c03, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) read$FUSE(r1, &(0x7f0000002000), 0x1000) write$FUSE_ENTRY(r1, &(0x7f0000000340)={0x90, 0x0, 0x2, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1bd4, 0x0, 0x0, r2}}}, 0x90) 11:13:28 executing program 6: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRCREATE(r1, &(0x7f0000000040)={0x7}, 0x7) 11:13:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") unshare(0x64000400) [ 259.967283] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:13:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x6b, &(0x7f0000000000)={0x0, @in6}, 0x98) [ 260.064734] IPVS: ftp: loaded support on port[0] = 21 [ 260.235788] IPVS: ftp: loaded support on port[0] = 21 11:13:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dba7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b7605afb988de9bba6df5fdc54d81bf6ba5629eef628582fba5bf4af44acfe05900", "ee42e3ef1d1772a9432c220303b70b708ad791137e2982fcce5d747a3131995a"}) 11:13:29 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r3 = mmap$binder(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0xc, 0x0, &(0x7f00000001c0)=[@free_buffer={0x40486311, r3}], 0x0, 0x0, &(0x7f0000000240)}) 11:13:29 executing program 6: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) 11:13:29 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="0a5cc80700315f85715070") listen(r0, 0x3) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1e82f) close(r2) r3 = accept4(r0, 0x0, &(0x7f0000000340)=0xfdce, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0'}, 0x4) 11:13:29 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x400000000803, 0x11) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8903, 0x706fff) 11:13:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x27}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 11:13:29 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) r3 = gettid() ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 11:13:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x627bf467}, 0x14) 11:13:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$sock_void(r0, 0x29, 0x23, 0x0, 0x0) 11:13:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 11:13:29 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='#! ./fil'], 0x8) close(r1) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000140)='{#,@^\x00', &(0x7f00000001c0)='H^loN.\x00'], &(0x7f0000000300)) 11:13:29 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket(0x2, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000000eff4)={0x20000000}) 11:13:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x400002}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) 11:13:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x16) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) [ 261.092518] syz-executor5 (8730) used greatest stack depth: 14360 bytes left 11:13:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x37da}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast1}}]}, 0x2c}}, 0x0) 11:13:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local, @local={0xfe, 0x8a00}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 11:13:31 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)="2f657865000000d400042a004bddd9de91be10eebf00f5e94aae22e89bb36cc7457accc3320c67a90f79805843e901d2da75af1f000000000000000045cc6158f031528844209c7ed05b160ef336721bf89686ff472f71dfca5353f6323ddf8006ffc1052d6a80985adc68017065648b35c7d321fc5c0466062fbfad5acbe7ff6cefe53c88c05ab970ceebdfa589098ad40d080deb2488f9e4069682b14483f113cb6979b2f390179a18e26b4088f1f31ed04a0a681f002e007436947475ab073711c98ae3b4259f1a1aff9b09aa66cb90ca43a1dbc6de15abb4ae739f9e8f047cd29ec76b9ef6beb7839f8071aaea4d247e6a9514748c93d0bb01a7c37ca6c856327af81f296d2c2c07c2d63b") r6 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r6, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='sit0\x00') sendfile(0xffffffffffffffff, r5, &(0x7f0000000040), 0x100000001) 11:13:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0xfffffdb9) fallocate(r1, 0x3, 0x10001, 0xc102) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0xffffffff000, 0x0, 0x0, 0x1000000}) 11:13:31 executing program 6: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid_for_children\x00') setns(r0, 0x0) 11:13:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r2, r1, &(0x7f0000000040)=0x3, 0x79ffffffffffff) 11:13:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 11:13:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)) r3 = gettid() ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) 11:13:31 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x32, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000000)={0x0, 0x3, [0x0, 0xaf2]}) 11:13:31 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a0000002901000004000000000000001d0000000000000000000000000000000007002e2f66696c6530"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}]}}) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 11:13:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x37da}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast1}}]}, 0x2c}}, 0x0) 11:13:31 executing program 6: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 11:13:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x37da}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast1}}]}, 0x2c}}, 0x0) 11:13:31 executing program 6: r0 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x200002c0, 0x20000410, 0x20000440], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'dummy0\x00', 'team_slave_1\x00', 'bpq0\x00', 'veth1_to_bond\x00', @broadcast, [], @empty, [], 0xa0, 0xf0, 0x120, [@state={'state\x00', 0x8}]}, [@common=@log={'log\x00', 0x28, {{0x0, "f0223373022f15f3fb8f8e8f422b8b5216d7c3922c5076c4a26bb410391c"}}}]}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'eql\x00', 'teql0\x00', 'veth1_to_bridge\x00', 'bcsf0\x00', @link_local, [], @local, [], 0x70, 0x70, 0xa0}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8}}]}]}, 0x2c8) 11:13:31 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000000140), 0x400000000000152, 0x40001ffc, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 262.800749] cannot load conntrack support for proto=7 11:13:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 11:13:31 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@ipv6_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0xa, 0x37da}, [@IFA_LOCAL={0x14, 0x2, @ipv4={[], [], @multicast1}}]}, 0x2c}}, 0x0) 11:13:31 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x20000000802, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}, 0x0) write(r1, &(0x7f0000000100)="240000001a0025f00018000400edfc0e8000000000000000000000000800020048050000", 0x24) 11:13:32 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) setpriority(0x0, r0, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x0, 0x0) r2 = syz_open_procfs(r0, &(0x7f00000001c0)='sched\x00') write$P9_RAUTH(r2, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x49, 0x1, 0x6}}, 0x14) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000380)='./file0//ile0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)="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", 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./file0//ile0\x00', 0x0, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x12) semop(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffc00}], 0x1) semtimedop(r1, &(0x7f000001dfd6)=[{0x0, 0xfffffffffffffff7}], 0x1, &(0x7f0000380000)={0x101}) semctl$IPC_RMID(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)="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") r6 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r6, &(0x7f00000000c0), 0x1c) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080), 0x0) sendmsg(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='sit0\x00') sendfile(0xffffffffffffffff, r5, &(0x7f0000000040), 0x100000001) 11:13:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000002600)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 11:13:32 executing program 3: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") readv(r0, &(0x7f0000000580)=[{&(0x7f0000000380)=""/78, 0x4e}, {&(0x7f0000000400)=""/19, 0x13}, {&(0x7f0000001740)=""/4096, 0x1000}], 0x3) [ 265.261269] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 268.269246] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 271.277262] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 274.285244] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 277.293239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 280.301238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 283.309259] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 286.317244] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 289.325236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 292.333240] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 295.341241] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 298.349240] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 301.357242] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 304.365238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 307.373246] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 310.381260] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 313.389242] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 316.397256] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 319.405237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 322.413238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 325.421240] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 328.429236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 331.437239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 334.445241] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 337.453237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 340.461237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 343.469239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 346.477239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 349.485237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 352.493239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 355.501241] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 358.509252] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 361.517239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 364.525240] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 367.533237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 370.541239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 373.549237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 376.557258] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 379.565239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 382.573236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 385.581238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 388.589236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 391.597237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 394.605236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 397.613237] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 400.621238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 403.629242] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 406.637238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 409.645239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 412.653235] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 415.661239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 418.669239] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 421.677236] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 424.685234] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 427.693238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 430.701238] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 432.588032] INFO: task syz-executor0:7920 blocked for more than 140 seconds. [ 432.595287] Not tainted 4.18.0-next-20180814+ #39 [ 432.600698] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 432.608695] syz-executor0 D22112 7920 1 0x00000004 [ 432.614361] Call Trace: [ 432.616992] __schedule+0x87c/0x1df0 [ 432.620755] ? retint_kernel+0x10/0x10 [ 432.624683] ? __sched_text_start+0x8/0x8 [ 432.628885] ? graph_lock+0x170/0x170 [ 432.632717] ? lock_downgrade+0x8f0/0x8f0 [ 432.636906] ? kasan_check_read+0x11/0x20 [ 432.641089] ? rcu_is_watching+0x8c/0x150 [ 432.645277] ? find_held_lock+0x36/0x1c0 [ 432.649382] schedule+0xfb/0x450 [ 432.652790] ? __schedule+0x1df0/0x1df0 [ 432.656829] ? kasan_check_read+0x11/0x20 [ 432.661026] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.665494] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 432.670123] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 432.675624] ? mutex_destroy+0x200/0x200 [ 432.679729] ? do_raw_spin_lock+0xc1/0x200 [ 432.684029] schedule_preempt_disabled+0x10/0x20 [ 432.688833] __mutex_lock+0xbf9/0x1700 [ 432.692775] ? vfat_lookup+0xf1/0x640 [ 432.696626] ? mutex_trylock+0x2b0/0x2b0 [ 432.700753] ? d_alloc_parallel+0x833/0x1eb0 [ 432.705209] ? d_alloc_parallel+0x833/0x1eb0 [ 432.709697] ? kasan_check_read+0x11/0x20 [ 432.713909] ? rcu_is_watching+0x8c/0x150 [ 432.718111] ? __lookup_slow+0x1e6/0x540 [ 432.722248] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.726995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.732590] ? d_alloc_parallel+0xb65/0x1eb0 [ 432.737063] ? __d_lookup_rcu+0xaa0/0xaa0 [ 432.741270] ? graph_lock+0x170/0x170 [ 432.745132] ? __lock_acquire+0x7fc/0x5020 [ 432.749436] ? graph_lock+0x170/0x170 [ 432.753286] ? get_page_from_freelist+0x3d7a/0x4490 [ 432.758385] ? graph_lock+0x170/0x170 [ 432.762259] ? find_held_lock+0x36/0x1c0 [ 432.766394] mutex_lock_nested+0x16/0x20 [ 432.770504] ? mutex_lock_nested+0x16/0x20 [ 432.774812] vfat_lookup+0xf1/0x640 [ 432.778491] ? __lockdep_init_map+0x105/0x590 [ 432.783054] ? vfat_find_form+0x120/0x120 [ 432.787271] ? lockdep_init_map+0x9/0x10 [ 432.791397] ? __init_waitqueue_head+0x9e/0x150 [ 432.796126] ? init_wait_entry+0x1c0/0x1c0 [ 432.800433] __lookup_slow+0x2b5/0x540 [ 432.804373] ? vfs_unlink+0x510/0x510 [ 432.808257] ? down_read+0xb5/0x1d0 [ 432.811933] ? lookup_slow+0x49/0x80 [ 432.815717] ? __down_interruptible+0x700/0x700 [ 432.820436] ? lookup_fast+0x470/0x12a0 [ 432.824497] ? __follow_mount_rcu.isra.35.part.36+0x890/0x890 [ 432.830433] lookup_slow+0x57/0x80 [ 432.834046] walk_component+0x94a/0x2630 [ 432.838164] ? trace_hardirqs_on+0xbd/0x2c0 [ 432.842555] ? alloc_empty_file+0x72/0x170 [ 432.846845] ? path_init+0x15ed/0x1fc0 [ 432.850813] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 432.855980] ? path_init+0x1fc0/0x1fc0 [ 432.859942] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.865013] ? set_root+0x42e/0x820 [ 432.868708] ? lookup_open+0x1b90/0x1b90 [ 432.872834] ? trace_hardirqs_on+0xbd/0x2c0 [ 432.877243] ? rcu_is_watching+0x8c/0x150 [ 432.881440] ? path_openat+0x20f/0x5300 [ 432.885482] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 432.890648] ? debug_mutex_init+0x2d/0x60 [ 432.894867] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.899950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.905556] ? security_inode_permission+0xd2/0x100 [ 432.910635] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.916255] ? vfat_hashi+0x14d/0x3a0 [ 432.920126] link_path_walk.part.42+0xa6e/0x1540 [ 432.924959] ? pick_link+0xb00/0xb00 [ 432.928767] ? walk_component+0x2630/0x2630 [ 432.933172] ? find_held_lock+0x36/0x1c0 [ 432.937317] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 432.942400] ? percpu_counter_add_batch+0xf2/0x150 [ 432.947397] path_openat+0x268/0x5300 [ 432.951266] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 432.956011] ? graph_lock+0x170/0x170 [ 432.959888] ? path_lookupat.isra.45+0xc00/0xc00 [ 432.964708] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 432.969835] ? expand_files.part.8+0x571/0x9c0 [ 432.974481] ? find_held_lock+0x36/0x1c0 [ 432.978613] ? lock_downgrade+0x8f0/0x8f0 [ 432.982834] ? do_sys_open+0x3a2/0x720 [ 432.986818] ? kasan_check_read+0x11/0x20 [ 432.991027] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.995501] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.000144] ? __lock_is_held+0xb5/0x140 [ 433.004288] ? _raw_spin_unlock+0x22/0x30 [ 433.008510] ? __alloc_fd+0x34e/0x710 [ 433.012378] ? usercopy_warn+0x120/0x120 [ 433.016511] do_filp_open+0x255/0x380 [ 433.020386] ? may_open_dev+0x100/0x100 [ 433.024571] ? get_unused_fd_flags+0x122/0x1a0 [ 433.029243] ? __alloc_fd+0x710/0x710 [ 433.033140] do_sys_open+0x584/0x720 [ 433.036939] ? filp_open+0x80/0x80 [ 433.040540] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.045721] __x64_sys_open+0x7e/0xc0 [ 433.049608] do_syscall_64+0x1b9/0x820 [ 433.053564] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.058989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.063993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.068928] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.074016] ? prepare_exit_to_usermode+0x291/0x3b0 [ 433.079097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.084014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.089252] RIP: 0033:0x455190 [ 433.092524] Code: 24 98 00 00 00 48 89 14 24 e8 dc ef ff ff 48 8b 44 24 10 48 8b 4c 24 08 48 8b 54 24 70 48 39 d0 0f 85 69 01 00 00 48 8b 9c 24 <10> 01 00 00 48 89 1c 24 48 89 54 24 08 48 89 4c 24 10 48 89 44 24 [ 433.111479] RSP: 002b:00007ffe40ba1510 EFLAGS: 00000202 ORIG_RAX: 0000000000000002 [ 433.119258] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000455190 [ 433.126588] RDX: 0000000000000000 RSI: 0000000000090800 RDI: 00000000004c1d23 [ 433.133917] RBP: 0000000000000125 R08: 0000000000000001 R09: 0000000001a98940 [ 433.141242] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000005 [ 433.148572] R13: 000000000004003a R14: 000000000000000d R15: badc0ffeebadface [ 433.155923] INFO: task syz-executor0:8767 blocked for more than 140 seconds. [ 433.163175] Not tainted 4.18.0-next-20180814+ #39 [ 433.168585] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 433.176606] syz-executor0 D23984 8767 7920 0x00000004 [ 433.182303] Call Trace: [ 433.184969] __schedule+0x87c/0x1df0 [ 433.188776] ? __sched_text_start+0x8/0x8 [ 433.193004] ? graph_lock+0x170/0x170 [ 433.196860] ? find_held_lock+0x36/0x1c0 [ 433.200999] ? mark_held_locks+0xc9/0x160 [ 433.205272] schedule+0xfb/0x450 [ 433.208985] ? lock_downgrade+0x8f0/0x8f0 [ 433.213210] ? __schedule+0x1df0/0x1df0 [ 433.217261] ? kasan_check_read+0x11/0x20 [ 433.221486] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.225970] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.230621] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 433.235957] ? kasan_check_write+0x14/0x20 [ 433.240254] ? do_raw_spin_lock+0xc1/0x200 [ 433.244555] d_alloc_parallel+0x1456/0x1eb0 [ 433.248961] ? __d_lookup_rcu+0xaa0/0xaa0 [ 433.253166] ? graph_lock+0x170/0x170 [ 433.257048] ? __lock_acquire+0x7fc/0x5020 [ 433.261348] ? graph_lock+0x170/0x170 [ 433.265247] ? wake_up_q+0x100/0x100 [ 433.269034] ? graph_lock+0x170/0x170 [ 433.272919] ? find_held_lock+0x36/0x1c0 [ 433.277050] ? __lockdep_init_map+0x105/0x590 [ 433.281622] ? __lockdep_init_map+0x105/0x590 [ 433.286266] ? lockdep_init_map+0x9/0x10 [ 433.290405] ? __init_waitqueue_head+0x9e/0x150 [ 433.295133] ? init_wait_entry+0x1c0/0x1c0 [ 433.299445] __lookup_slow+0x1e6/0x540 [ 433.303498] ? vfs_unlink+0x510/0x510 [ 433.307376] ? down_read+0xb5/0x1d0 [ 433.311062] ? lookup_slow+0x49/0x80 [ 433.314844] ? __down_interruptible+0x700/0x700 [ 433.319573] ? lookup_fast+0x470/0x12a0 [ 433.323625] ? __follow_mount_rcu.isra.35.part.36+0x890/0x890 [ 433.329570] lookup_slow+0x57/0x80 [ 433.333191] walk_component+0x94a/0x2630 [ 433.337316] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.341707] ? alloc_empty_file+0x72/0x170 [ 433.346026] ? path_init+0x15ed/0x1fc0 [ 433.349983] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.355149] ? path_init+0x1fc0/0x1fc0 [ 433.359119] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.364194] ? set_root+0x42e/0x820 [ 433.369289] ? lookup_open+0x1b90/0x1b90 [ 433.373409] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.377821] ? rcu_is_watching+0x8c/0x150 [ 433.382029] ? path_openat+0x20f/0x5300 [ 433.386081] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.391255] ? debug_mutex_init+0x2d/0x60 [ 433.395483] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.400561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.406166] ? security_inode_permission+0xd2/0x100 [ 433.411249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.416854] ? vfat_hashi+0x14d/0x3a0 [ 433.420719] link_path_walk.part.42+0xa6e/0x1540 [ 433.425562] ? pick_link+0xb00/0xb00 [ 433.429349] ? walk_component+0x2630/0x2630 [ 433.433778] ? find_held_lock+0x36/0x1c0 [ 433.438264] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.443364] ? percpu_counter_add_batch+0xf2/0x150 [ 433.448366] path_openat+0x268/0x5300 [ 433.452251] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.456992] ? graph_lock+0x170/0x170 [ 433.460870] ? path_lookupat.isra.45+0xc00/0xc00 [ 433.465687] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.470800] ? expand_files.part.8+0x571/0x9c0 [ 433.475452] ? find_held_lock+0x36/0x1c0 [ 433.479585] ? lock_downgrade+0x8f0/0x8f0 [ 433.483816] ? do_sys_open+0x3a2/0x720 [ 433.487811] ? kasan_check_read+0x11/0x20 [ 433.492020] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.496495] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.501142] ? __lock_is_held+0xb5/0x140 [ 433.505275] ? _raw_spin_unlock+0x22/0x30 [ 433.509491] ? __alloc_fd+0x34e/0x710 [ 433.513375] ? usercopy_warn+0x120/0x120 [ 433.517508] do_filp_open+0x255/0x380 [ 433.521384] ? may_open_dev+0x100/0x100 [ 433.525433] ? get_unused_fd_flags+0x122/0x1a0 [ 433.530092] ? __alloc_fd+0x710/0x710 [ 433.533961] do_sys_open+0x584/0x720 [ 433.537764] ? filp_open+0x80/0x80 [ 433.541363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 433.546968] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.552135] ? ksys_ioctl+0x81/0xd0 [ 433.555867] __x64_sys_open+0x7e/0xc0 [ 433.559728] do_syscall_64+0x1b9/0x820 [ 433.563720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.569172] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.574182] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 433.579258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.584349] ? recalc_sigpending_tsk+0x180/0x180 [ 433.589164] ? kasan_check_write+0x14/0x20 [ 433.593475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.598383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.603631] RIP: 0033:0x410dc1 [ 433.606882] Code: c7 84 24 80 00 00 00 00 00 00 00 48 c7 84 24 88 00 00 00 00 00 00 00 48 c7 84 24 90 00 00 00 00 00 00 00 48 8d 05 0f 5e 04 00 <48> 89 44 24 78 48 8d 44 24 50 48 89 84 24 80 00 00 00 48 8d 84 24 [ 433.625845] RSP: 002b:00007fedba4a3bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 433.633619] RAX: ffffffffffffffda RBX: 00007fedba4a46d4 RCX: 0000000000410dc1 [ 433.640955] RDX: 00007fedba4a3be8 RSI: 0000000000000002 RDI: 00007fedba4a3bd0 [ 433.648350] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000018 [ 433.655679] R10: 000000000000000d R11: 0000000000000293 R12: 00000000ffffffff [ 433.663007] R13: 00000000004d6aa0 R14: 00000000004ca01f R15: 0000000000000001 [ 433.670359] INFO: task syz-executor0:8773 blocked for more than 140 seconds. [ 433.677592] Not tainted 4.18.0-next-20180814+ #39 [ 433.683016] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 433.691032] syz-executor0 D23984 8773 7920 0x00000004 [ 433.696815] Call Trace: [ 433.699480] __schedule+0x87c/0x1df0 [ 433.703267] ? __sched_text_start+0x8/0x8 [ 433.707490] ? graph_lock+0x170/0x170 [ 433.709254] syz-executor0(8760): getblk(): executed=9 bh_count=0 bh_state=0 [ 433.711358] ? find_held_lock+0x36/0x1c0 [ 433.722593] ? mark_held_locks+0xc9/0x160 [ 433.726847] schedule+0xfb/0x450 [ 433.730264] ? lock_downgrade+0x8f0/0x8f0 [ 433.734485] ? __schedule+0x1df0/0x1df0 [ 433.738525] ? kasan_check_read+0x11/0x20 [ 433.742770] ? do_raw_spin_unlock+0xa7/0x2f0 [ 433.747254] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 433.751915] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 433.757250] ? kasan_check_write+0x14/0x20 [ 433.761551] ? do_raw_spin_lock+0xc1/0x200 [ 433.765854] d_alloc_parallel+0x1456/0x1eb0 [ 433.770273] ? __d_lookup_rcu+0xaa0/0xaa0 [ 433.774481] ? graph_lock+0x170/0x170 [ 433.778354] ? __lock_acquire+0x7fc/0x5020 [ 433.782645] ? compat_start_thread+0x80/0x80 [ 433.787133] ? graph_lock+0x170/0x170 [ 433.790992] ? wake_up_q+0x100/0x100 [ 433.794799] ? graph_lock+0x170/0x170 [ 433.798664] ? find_held_lock+0x36/0x1c0 [ 433.802825] ? __lockdep_init_map+0x105/0x590 [ 433.807403] ? __lockdep_init_map+0x105/0x590 [ 433.811982] ? lockdep_init_map+0x9/0x10 [ 433.816104] ? __init_waitqueue_head+0x9e/0x150 [ 433.820858] ? init_wait_entry+0x1c0/0x1c0 [ 433.825166] __lookup_slow+0x1e6/0x540 [ 433.829124] ? vfs_unlink+0x510/0x510 [ 433.832995] ? down_read+0xb5/0x1d0 [ 433.836683] ? lookup_slow+0x49/0x80 [ 433.840459] ? __down_interruptible+0x700/0x700 [ 433.845196] ? lookup_fast+0x470/0x12a0 [ 433.849259] ? __follow_mount_rcu.isra.35.part.36+0x890/0x890 [ 433.855247] lookup_slow+0x57/0x80 [ 433.858854] walk_component+0x94a/0x2630 [ 433.863049] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.867431] ? alloc_empty_file+0x72/0x170 [ 433.871730] ? path_init+0x15ed/0x1fc0 [ 433.875706] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.880912] ? path_init+0x1fc0/0x1fc0 [ 433.884861] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.889954] ? set_root+0x42e/0x820 [ 433.893644] ? lookup_open+0x1b90/0x1b90 [ 433.897797] ? trace_hardirqs_on+0xbd/0x2c0 [ 433.902182] ? rcu_is_watching+0x8c/0x150 [ 433.906403] ? path_openat+0x20f/0x5300 [ 433.910436] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 433.915614] ? debug_mutex_init+0x2d/0x60 [ 433.919854] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.924941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.930540] ? security_inode_permission+0xd2/0x100 [ 433.935636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.941246] ? vfat_hashi+0x14d/0x3a0 [ 433.945120] link_path_walk.part.42+0xa6e/0x1540 [ 433.949938] ? pick_link+0xb00/0xb00 [ 433.953728] ? walk_component+0x2630/0x2630 [ 433.958138] ? find_held_lock+0x36/0x1c0 [ 433.962276] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.967363] ? percpu_counter_add_batch+0xf2/0x150 [ 433.972375] path_openat+0x268/0x5300 [ 433.976251] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 433.981008] ? graph_lock+0x170/0x170 [ 433.984870] ? path_lookupat.isra.45+0xc00/0xc00 [ 433.989695] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.994820] ? expand_files.part.8+0x571/0x9c0 [ 433.999485] ? find_held_lock+0x36/0x1c0 [ 434.003612] ? lock_downgrade+0x8f0/0x8f0 [ 434.007845] ? do_sys_open+0x3a2/0x720 [ 434.011821] ? kasan_check_read+0x11/0x20 [ 434.016035] ? do_raw_spin_unlock+0xa7/0x2f0 [ 434.020505] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 434.025163] ? __lock_is_held+0xb5/0x140 [ 434.029300] ? _raw_spin_unlock+0x22/0x30 [ 434.033521] ? __alloc_fd+0x34e/0x710 [ 434.037379] ? usercopy_warn+0x120/0x120 [ 434.041516] do_filp_open+0x255/0x380 [ 434.045372] ? may_open_dev+0x100/0x100 [ 434.049428] ? get_unused_fd_flags+0x122/0x1a0 [ 434.054072] ? __alloc_fd+0x710/0x710 [ 434.057947] do_sys_open+0x584/0x720 [ 434.061722] ? filp_open+0x80/0x80 [ 434.065361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 434.070960] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 434.076138] ? ksys_ioctl+0x81/0xd0 [ 434.079837] __x64_sys_open+0x7e/0xc0 [ 434.083717] do_syscall_64+0x1b9/0x820 [ 434.087686] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 434.093123] ? syscall_return_slowpath+0x5e0/0x5e0 [ 434.098111] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 434.103198] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 434.108298] ? recalc_sigpending_tsk+0x180/0x180 [ 434.113127] ? kasan_check_write+0x14/0x20 [ 434.117423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.122350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.127597] RIP: 0033:0x410dc1 [ 434.130856] Code: c7 84 24 80 00 00 00 00 00 00 00 48 c7 84 24 88 00 00 00 00 00 00 00 48 c7 84 24 90 00 00 00 00 00 00 00 48 8d 05 0f 5e 04 00 <48> 89 44 24 78 48 8d 44 24 50 48 89 84 24 80 00 00 00 48 8d 84 24 [ 434.149834] RSP: 002b:00007fedba482bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 434.157609] RAX: ffffffffffffffda RBX: 00007fedba4836d4 RCX: 0000000000410dc1 [ 434.164934] RDX: 00007fedba482be7 RSI: 0000000000000002 RDI: 00007fedba482bd0 [ 434.172259] RBP: 00000000009301e0 R08: 0000000000000000 R09: 0000000000000017 [ 434.179591] R10: 000000000000000c R11: 0000000000000293 R12: 00000000ffffffff [ 434.186932] R13: 00000000004d6aa0 R14: 00000000004ca01f R15: 0000000000000002 [ 434.194267] [ 434.194267] Showing all locks held in the system: [ 434.200680] 1 lock held by khungtaskd/773: [ 434.204965] #0: 000000003cad8bc4 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x428 [ 434.213666] 1 lock held by rsyslogd/4252: [ 434.217861] #0: 00000000b587cc9c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 434.225948] 2 locks held by getty/4342: [ 434.229968] #0: 00000000558a8418 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.238298] #1: 00000000f1d7a2d7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.247244] 2 locks held by getty/4343: [ 434.251269] #0: 00000000d17ccdaf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.259583] #1: 00000000b3f7b3c1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.268522] 2 locks held by getty/4344: [ 434.272544] #0: 0000000032e16e3d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.280875] #1: 0000000017054029 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.289820] 2 locks held by getty/4345: [ 434.293854] #0: 000000006e9e746d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.302172] #1: 00000000f84cc53e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.311150] 2 locks held by getty/4346: [ 434.315176] #0: 000000006e4e2eec (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.323524] #1: 00000000e21cd0df (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.332468] 2 locks held by getty/4347: [ 434.336491] #0: 00000000df353f35 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.345317] #1: 0000000032f91962 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.354241] 2 locks held by getty/4348: [ 434.358263] #0: 000000001cce5cc2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 434.366591] #1: 0000000033723a2e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 434.375544] 2 locks held by syz-executor0/7920: [ 434.380252] #0: 00000000c7306e0b (&sb->s_type->i_mutex_key#20){++++}, at: lookup_slow+0x49/0x80 [ 434.389298] #1: 00000000a4a3e4cb (&sbi->s_lock){+.+.}, at: vfat_lookup+0xf1/0x640 [ 434.397102] 2 locks held by syz-executor0/8760: [ 434.401837] 1 lock held by syz-executor0/8767: [ 434.406464] #0: 00000000c7306e0b (&sb->s_type->i_mutex_key#20){++++}, at: lookup_slow+0x49/0x80 [ 434.415501] 1 lock held by syz-executor0/8773: [ 434.420133] #0: 00000000c7306e0b (&sb->s_type->i_mutex_key#20){++++}, at: lookup_slow+0x49/0x80 [ 434.429162] [ 434.430847] ============================================= [ 434.430847] [ 434.437937] NMI backtrace for cpu 1 [ 434.441619] CPU: 1 PID: 773 Comm: khungtaskd Not tainted 4.18.0-next-20180814+ #39 [ 434.449337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.458699] Call Trace: [ 434.461327] dump_stack+0x1c9/0x2b4 [ 434.464980] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.470192] ? vprintk_default+0x28/0x30 [ 434.474285] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 434.479506] nmi_cpu_backtrace.cold.3+0x48/0x88 [ 434.484196] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 434.488886] ? lapic_can_unplug_cpu.cold.28+0x3f/0x3f [ 434.494097] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 434.499395] arch_trigger_cpumask_backtrace+0x14/0x20 [ 434.504605] watchdog+0xb39/0x1040 [ 434.508176] ? reset_hung_task_detector+0xd0/0xd0 [ 434.513043] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 434.518166] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 434.523286] ? lockdep_hardirqs_on+0x421/0x5c0 [ 434.527900] ? trace_hardirqs_on+0xbd/0x2c0 [ 434.532236] ? kasan_check_read+0x11/0x20 [ 434.536409] ? __kthread_parkme+0xd7/0x1b0 [ 434.540669] ? kasan_check_write+0x14/0x20 [ 434.544924] ? do_raw_spin_lock+0xc1/0x200 [ 434.549179] ? __kthread_parkme+0x58/0x1b0 [ 434.553435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.558994] ? __kthread_parkme+0x106/0x1b0 [ 434.563342] kthread+0x35a/0x420 [ 434.566730] ? reset_hung_task_detector+0xd0/0xd0 [ 434.571622] ? kthread_bind+0x40/0x40 [ 434.575446] ret_from_fork+0x3a/0x50 [ 434.579255] Sending NMI from CPU 1 to CPUs 0: [ 434.585572] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.531 msecs [ 434.585835] NMI backtrace for cpu 0 [ 434.585843] CPU: 0 PID: 8760 Comm: syz-executor0 Not tainted 4.18.0-next-20180814+ #39 [ 434.585850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.585855] RIP: 0010:find_get_entry+0xafe/0x1120 [ 434.585868] Code: 29 f9 83 c1 54 c1 e9 03 f3 48 ab 4c 89 f0 48 8b 4d d0 65 48 33 0c 25 28 00 00 00 0f 85 30 05 00 00 48 8d 65 d8 5b 41 5c 41 5d <41> 5e 41 5f 5d c3 e8 37 a5 e1 ff 49 8d 44 24 80 49 8d 7d 40 48 89 [ 434.585873] RSP: 0018:ffff8801bce765d8 EFLAGS: 00000246 [ 434.585882] RAX: 0000000000000000 RBX: ffff8801c92facd8 RCX: 0000000000000000 [ 434.585888] RDX: 1ffffffff0fe3665 RSI: 0000000000000003 RDI: ffffed00379cecb0 [ 434.585894] RBP: ffff8801bce765e8 R08: 1ffff100379cec27 R09: ffffed003b6046d6 [ 434.585900] R10: 0000000000000003 R11: 0000000000000002 R12: dffffc0000000000 [ 434.585906] R13: 0000000000000001 R14: 0000000000000000 R15: dffffc0000000000 [ 434.585912] FS: 00007fedba4c5700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 434.585917] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 434.585923] CR2: ffffffffff600400 CR3: 00000001b71b6000 CR4: 00000000001406f0 [ 434.585929] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 434.585935] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 434.585938] Call Trace: [ 434.585942] pagecache_get_page+0x11e/0xe40 [ 434.585946] ? retint_kernel+0x10/0x10 [ 434.585951] ? find_get_pages_contig+0x1890/0x1890 [ 434.585955] ? print_usage_bug+0xc0/0xc0 [ 434.585959] ? check_same_owner+0x340/0x340 [ 434.585963] ? lockdep_hardirqs_on+0x421/0x5c0 [ 434.585968] ? rcu_note_context_switch+0x680/0x680 [ 434.585972] ? print_usage_bug+0xc0/0xc0 [ 434.585976] ? mark_held_locks+0xc9/0x160 [ 434.585980] ? __find_get_block+0x2c0/0xdf0 [ 434.585984] ? __find_get_block+0x2c0/0xdf0 [ 434.585989] ? lockdep_hardirqs_on+0x421/0x5c0 [ 434.585993] ? trace_hardirqs_on+0xbd/0x2c0 [ 434.585997] ? __getblk_gfp+0x3dc/0xe00 [ 434.586001] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 434.586006] ? __find_get_block+0x2f2/0xdf0 [ 434.586010] __find_get_block+0x5b1/0xdf0 [ 434.586014] ? try_to_free_buffers+0x700/0x700 [ 434.586018] ? init_page_buffers+0xad/0x530 [ 434.586023] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 434.586027] ? unlock_page+0x1d1/0x2c0 [ 434.586031] ? wake_up_page_bit+0x5b0/0x5b0 [ 434.586035] ? mark_buffer_dirty+0x650/0x650 [ 434.586039] ? write_comp_data+0x1b/0x70 [ 434.586043] __getblk_gfp+0x3dc/0xe00 [ 434.586047] ? __find_get_block+0xdf0/0xdf0 [ 434.586051] ? graph_lock+0x170/0x170 [ 434.586055] ? graph_lock+0x170/0x170 [ 434.586059] ? graph_lock+0x170/0x170 [ 434.586064] ? rcu_read_lock_sched_held+0x108/0x120 [ 434.586067] __bread_gfp+0x2d/0x310 [ 434.586071] fat__get_entry+0x59c/0xa30 [ 434.586076] ? check_same_owner+0x340/0x340 [ 434.586079] ? copy_overflow+0x30/0x30 [ 434.586083] ? vfat_lookup+0xf1/0x640 [ 434.586087] fat_search_long+0x33b/0x15d0 [ 434.586091] ? kasan_check_read+0x11/0x20 [ 434.586095] ? rcu_is_watching+0x8c/0x150 [ 434.586100] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 434.586104] ? fat_parse_short+0x2cb0/0x2cb0 [ 434.586108] ? __d_lookup_rcu+0xaa0/0xaa0 [ 434.586112] ? graph_lock+0x170/0x170 [ 434.586116] ? __lock_acquire+0x7fc/0x5020 [ 434.586120] ? graph_lock+0x170/0x170 [ 434.586124] ? get_page_from_freelist+0x3d7a/0x4490 [ 434.586128] ? graph_lock+0x170/0x170 [ 434.586132] vfat_find+0x16d/0x1a0 [ 434.586136] vfat_lookup+0x107/0x640 [ 434.586140] ? __lockdep_init_map+0x105/0x590 [ 434.586144] ? vfat_find_form+0x120/0x120 [ 434.586148] ? lockdep_init_map+0x9/0x10 [ 434.586152] ? __init_waitqueue_head+0x9e/0x150 [ 434.586157] ? init_wait_entry+0x1c0/0x1c0 [ 434.586160] __lookup_slow+0x2b5/0x540 [ 434.586164] ? vfs_unlink+0x510/0x510 [ 434.586168] ? down_read+0xb5/0x1d0 [ 434.586172] ? lookup_slow+0x49/0x80 [ 434.586176] ? __down_interruptible+0x700/0x700 [ 434.586180] ? lookup_fast+0x470/0x12a0 [ 434.586185] ? __follow_mount_rcu.isra.35.part.36+0x890/0x890 [ 434.586189] lookup_slow+0x57/0x80 [ 434.586193] walk_component+0x94a/0x2630 [ 434.586197] ? trace_hardirqs_on+0xbd/0x2c0 [ 434.586206] ? alloc_empty_file+0x72/0x170 [ 434.586210] ? path_init+0x15ed/0x1fc0 [ 434.586214] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 434.586218] ? path_init+0x1fc0/0x1fc0 [ 434.586223] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.586227] ? set_root+0x42e/0x820 [ 434.586231] ? lookup_open+0x1b90/0x1b90 [ 434.586235] ? trace_hardirqs_on+0xbd/0x2c0 [ 434.586239] ? rcu_is_watching+0x8c/0x150 [ 434.586243] ? path_openat+0x20f/0x5300 [ 434.586248] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 434.586252] ? debug_mutex_init+0x2d/0x60 [ 434.586256] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.586261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.586266] ? security_inode_permission+0xd2/0x100 [ 434.586271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.586274] ? vfat_hashi+0x14d/0x3a0 [ 434.586279] link_path_walk.part.42+0xa6e/0x1540 [ 434.586283] ? pick_link+0xb00/0xb00 [ 434.586287] ? update_load_avg+0x27d0/0x27d0 [ 434.586297] ? walk_component+0x2630/0x2630 [ 434.586301] ? find_held_lock+0x36/0x1c0 [ 434.586306] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 434.586310] ? percpu_counter_add_batch+0xf2/0x150 [ 434.586314] path_openat+0x268/0x5300 [ 434.586319] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 434.586323] ? graph_lock+0x170/0x170 [ 434.586327] ? path_lookupat.isra.45+0xc00/0xc00 [ 434.586332] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.586336] ? expand_files.part.8+0x571/0x9c0 [ 434.586340] ? find_held_lock+0x36/0x1c0 [ 434.586344] ? lock_downgrade+0x8f0/0x8f0 [ 434.586348] ? do_sys_open+0x3a2/0x720 [ 434.586352] ? kasan_check_read+0x11/0x20 [ 434.586356] ? do_raw_spin_unlock+0xa7/0x2f0 [ 434.586361] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 434.586365] ? __lock_is_held+0xb5/0x140 [ 434.586369] ? _raw_spin_unlock+0x22/0x30 [ 434.586373] ? __alloc_fd+0x34e/0x710 [ 434.586377] ? usercopy_warn+0x120/0x120 [ 434.586380] do_filp_open+0x255/0x380 [ 434.586384] ? may_open_dev+0x100/0x100 [ 434.586389] ? get_unused_fd_flags+0x122/0x1a0 [ 434.586393] ? __alloc_fd+0x710/0x710 [ 434.586397] ? do_syscall_64+0x6be/0x820 [ 434.586400] do_sys_open+0x584/0x720 [ 434.586404] ? filp_open+0x80/0x80 [ 434.586409] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 434.586413] ? ksys_ioctl+0x81/0xd0 [ 434.586417] __x64_sys_open+0x7e/0xc0 [ 434.586421] do_syscall_64+0x1b9/0x820 [ 434.586425] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 434.586430] ? syscall_return_slowpath+0x5e0/0x5e0 [ 434.586435] ? trace_hardirqs_on_caller+0x2b0/0x2b0 [ 434.586439] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 434.586444] ? recalc_sigpending_tsk+0x180/0x180 [ 434.586448] ? kasan_check_write+0x14/0x20 [ 434.586452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.586457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.586460] RIP: 0033:0x410dc1 [ 434.586473] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 434.586478] RSP: 002b:00007fedba4c4bb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 434.586488] RAX: ffffffffffffffda RBX: 00007fedba4c56d4 RCX: 0000000000410dc1 [ 434.586494] RDX: 00007fedba4c4be7 RSI: 0000000000000002 RDI: 00007fedba4c4bd0 [ 434.586500] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000017 [ 434.586506] R10: 000000000000000c R11: 0000000000000293 R12: 00000000ffffffff [ 434.586512] R13: 00000000004d6aa0 R14: 00000000004ca01f R15: 0000000000000000 [ 434.586549] Kernel panic - not syncing: hung_task: blocked tasks [ 435.317091] CPU: 1 PID: 773 Comm: khungtaskd Not tainted 4.18.0-next-20180814+ #39 [ 435.324811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.334178] Call Trace: [ 435.336805] dump_stack+0x1c9/0x2b4 [ 435.340459] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.345672] ? printk_safe_log_store+0x2f0/0x2f0 [ 435.350451] panic+0x238/0x4e7 [ 435.353667] ? add_taint.cold.5+0x16/0x16 [ 435.357843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.363407] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 435.368878] ? printk_safe_flush+0xd7/0x130 [ 435.373225] watchdog+0xb4a/0x1040 [ 435.376822] ? reset_hung_task_detector+0xd0/0xd0 [ 435.381691] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 435.386816] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 435.391940] ? lockdep_hardirqs_on+0x421/0x5c0 [ 435.396544] ? trace_hardirqs_on+0xbd/0x2c0 [ 435.400882] ? kasan_check_read+0x11/0x20 [ 435.405052] ? __kthread_parkme+0xd7/0x1b0 [ 435.409316] ? kasan_check_write+0x14/0x20 [ 435.413571] ? do_raw_spin_lock+0xc1/0x200 [ 435.417826] ? __kthread_parkme+0x58/0x1b0 [ 435.422082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.427634] ? __kthread_parkme+0x106/0x1b0 [ 435.431982] kthread+0x35a/0x420 [ 435.435372] ? reset_hung_task_detector+0xd0/0xd0 [ 435.440228] ? kthread_bind+0x40/0x40 [ 435.444050] ret_from_fork+0x3a/0x50 [ 435.448488] Dumping ftrace buffer: [ 435.452077] (ftrace buffer empty) [ 435.455802] Kernel Offset: disabled [ 435.459428] Rebooting in 86400 seconds..