ROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90c5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x1d2, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xac}]}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x80000}, 0x14) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000500)={0x2, {{0x2, 0x4e22, @local}}, 0x0, 0x2, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e20, @local}}]}, 0x190) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 169.937538] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.960955] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 169.974836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.983058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.991536] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.997871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.011984] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 170.018489] hrtimer: interrupt took 27285 ns [ 170.019793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.034505] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 170.040553] audit: type=1400 audit(1571330249.245:39): avc: denied { create } for pid=6902 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 170.065229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.074304] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.089936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.100795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.108273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.117504] audit: type=1400 audit(1571330249.245:40): avc: denied { write } for pid=6902 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 170.142650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.158064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 170.176693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.183209] audit: type=1400 audit(1571330249.245:41): avc: denied { read } for pid=6902 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 170.215581] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 170.224879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.238526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 170.247279] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.258100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.265849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.276577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.294771] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 170.305939] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 170.322482] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.329424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.343668] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.359037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.366237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.377330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 170.393992] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.404862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 170.413730] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.426647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.436721] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 16:37:29 executing program 5: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) getegid() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x218, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffff6434}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xf15}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x65}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @rand_addr="f89b6f20624309beec16cb2459523ee4", 0x10001}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xabf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x90c5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff00}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x1d2, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xac}]}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x80000}, 0x14) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000500)={0x2, {{0x2, 0x4e22, @local}}, 0x0, 0x2, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e20, @local}}]}, 0x190) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 170.448693] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 170.460675] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 170.469027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 170.479596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.492862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.502842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.513264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.524379] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.530883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.548554] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 170.558032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.569350] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 170.584100] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.596018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.608644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.629159] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 170.649470] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 170.662636] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.673823] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 170.692881] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.699737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.708890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.725907] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.732302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.758322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 170.774907] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 170.788824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.797545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 16:37:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x10004, 0x3, 0x4000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 170.806032] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.812434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.831543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.839625] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 170.849905] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 170.885933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 170.903870] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.911341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.923877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.943230] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.949749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.977960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.996502] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 171.005654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.016392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 171.029929] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 16:37:30 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000015c0)='memory.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000440)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x10001, @dev={0xfe, 0x80, [], 0x23}, 0x8}, {0xa, 0x4e24, 0x80000000, @local, 0x3}, r4}}, 0x48) write$cgroup_int(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffff9, 0x5, 0x0, 0x8001, 0x5, 0x5, 0x7f, 0x1, 0x5, 0x0, 0x0, 0x266, 0x3, 0x101, 0x1f, 0x1f, 0x0, 0xfffffffffffffffa, 0x5, 0x8, 0xff, 0x0, 0x7, 0x1, 0x5, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp, 0x8000, 0x9, 0x1, 0x0, 0x100000001, 0x1f}, 0xffffffffffffffff, 0x0, r3, 0x9) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) recvmsg(r3, &(0x7f0000001580)={&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, &(0x7f0000000580)=""/4096, 0x1000}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 16:37:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sigaltstack(&(0x7f0000603000/0x3000)=nil, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) getsockname$unix(r3, &(0x7f00000000c0)=@abs, &(0x7f0000000000)=0x6e) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f00000001c0)=0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r4, &(0x7f0000000040)=0x100000, 0x8001) 16:37:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r2, &(0x7f00000002c0)={{r3, r4/1000+10000}, 0x14, 0x7, 0x7fff}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e22, 0x62d, @empty, 0xffffffff}, {0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0xf}, 0xaf0}, 0x8, [0x1, 0x9, 0x4, 0x32, 0x6, 0x80000001, 0x0, 0x2]}, 0x5c) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000300)=0xd995) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 171.044933] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.052304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.061642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.069577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.077336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.085206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.103913] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 171.119902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 171.129150] ubi0: attaching mtd0 [ 171.129523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.135210] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 171.141979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.192135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.233814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.248698] ubi0: attaching mtd0 [ 171.256373] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 171.267423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.297844] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.314114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 171.334868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 171.351806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.363068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.386791] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.394536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.405766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 171.419591] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 171.438221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.447657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.455896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.469198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 171.480654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.491229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.501325] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 171.507745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.517124] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 171.528311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.625982] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 171.645967] 8021q: adding VLAN 0 to HW filter on device batadv0 16:37:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000000, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000100)="e51935a1bc4cfc1c8f6044d0921cf6e277fdd2c91b9ba2f7a7", 0x19) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x280007bf, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0xfffffffffffffff9, 0x400) read$char_usb(r1, &(0x7f0000000280), 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x20, 0x101000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0xdf, "7680a49ad7a5b011991d1232a7cc289d1d8fcfe0c94918b58659b1b4d9f266951de11c4580a84690571c3a923ddcfc1686de464f509ecec93bb53989d536e9d220fae3d689d6efd0260c5f7ece985fec56900df4af1c384fcf3503e9a0ba6665c9b65bf8bc5a033984dcf260f0badbf2fbfbf5a05a90daf5ebda5caeb3c733fabf00acea195383995db784bab98fa339448d9db02d2f5facf4f0fd7a020780631e12e64493bbeb78f1a6ee8b92416d7214ad9c5334f6ed1766fb02ec2dbfaf704b8157ba710dfd052f788acfd967f1fb6e3c4719c019b0c6a3d27d9c4d5ea2"}, &(0x7f0000000080)=0xe7) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000000c0)={r3, 0x8, 0x20}, 0xc) 16:37:32 executing program 3: r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x400) write$tun(r1, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x80000) 16:37:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$TIOCSBRK(r0, 0x5427) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)=0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)="b8", 0x3bf, 0xc044, &(0x7f0000ab0000)={0xa, 0x4e22, 0x0, @loopback}, 0x83) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000016c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000000)=0x5ec) 16:37:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) 16:37:32 executing program 4: sendmsg$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = memfd_create(&(0x7f0000000200)='\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1000000) read(r0, &(0x7f00000000c0)=""/48, 0xfffffca3) close(r1) 16:37:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r2, &(0x7f00000002c0)={{r3, r4/1000+10000}, 0x14, 0x7, 0x7fff}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e22, 0x62d, @empty, 0xffffffff}, {0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0xf}, 0xaf0}, 0x8, [0x1, 0x9, 0x4, 0x32, 0x6, 0x80000001, 0x0, 0x2]}, 0x5c) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000300)=0xd995) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 16:37:32 executing program 2: r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000001c0)=""/177) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'gre0\x00\x00\x00\x05\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'teql0\x00\xf2\x00\xc0]\xc7\x00', 0x4}, 0x310) r3 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0xfffffdf5, r3}, 0xd3) r4 = syz_open_procfs(0x0, &(0x7f0000000400)='coredump_filter\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) getsockname(r2, &(0x7f0000000280)=@alg, &(0x7f0000000000)=0x80) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB="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"/411, @ANYRESDEC=r4, @ANYRES32=r1], @ANYRES64]]) 16:37:32 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2ea, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x913446d3d5959ef4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000400), 0x1fd) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x2, @mcast1, 0x3}, 0x19) r2 = request_key(&(0x7f00000002c0)='cifs.spnego\x00\x1f\xbf\xd1\xed\xc4\xb4\x1a\x89\n\xb4\xbd\x12\xc2\xe8\x82\xca\xdb\x91$\x94\xcdF\x82\xf1\x10\"[\x857b,8', &(0x7f00000008c0)={'\x00\x00 ', 0x1}, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000940)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r2, 0xfffffffffffffffe, r2) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0xb, 0xc, "1ce71f571449ea0bc11cb83dd6621ad0dbe76da63b20d86370d495ae9e118f6bb2104a6d8922e528ed1add1f9ddde7e2f317cd67a7c5f0a9ebc1590ebccbd32b", "7b7a31ba7107dfec8cc62580cc9121ddf971f988461013c0a5751ce0330d1a5a"}) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0xfffffffffffffffd, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0xffffffff}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r6 = getegid() r7 = getegid() keyctl$chown(0x4, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r8 = getegid() keyctl$chown(0x4, 0x0, 0x0, r8) setgroups(0x4, &(0x7f0000000280)=[r7, 0x0, r7, r8]) r9 = getegid() setgroups(0x1, &(0x7f0000000200)=[r9]) getgroups(0x40000233, &(0x7f0000000240)=[0xee01, 0xffffffffffffffff, r6, 0xee01, r9, 0xee01]) fsetxattr$system_posix_acl(r5, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="020076a34e432db4fd2200084ae36c393d14e71b245caf3f91c6051823f4c55e248b97de3d4dd3fe5c7ac4e41cd709d87dc84ccd603342aa60c99bb5bc0003e4ae3be3c85dd35cd1c0090bdd189fd8bc409d4c83b522cfd238bd79832c27d891ded08235d0a6598d8b73ccf840f0694ea20cb21da5ea9cdf00"/149, @ANYRES32=r9, @ANYBLOB="c475181c69074849cc870c008ed6c46f917d0000002000000000"], 0x2c, 0x1) dup2(r3, r3) ioctl$TCGETS(r3, 0x5401, &(0x7f0000000680)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)={0x1, 0x2, 0x1000, 0x0, &(0x7f0000000000), 0x36, 0x0, &(0x7f00000001c0)="13feecc3387daf40df2d1f47822c1a44e9a1f2847a151617c9727e8114e4a7dcc3b1105c613461dc5d5541a4b0e0a40df85ce87589b4"}) socket$netlink(0x10, 0x3, 0xb) r10 = socket(0x10, 0x2, 0xc) write(r10, &(0x7f0000594000)="1f0000000104ff00fd4354c007", 0xd) r11 = socket$key(0xf, 0x3, 0x2) dup2(r11, r10) r12 = socket(0x10, 0x2, 0xc) write(r12, &(0x7f0000594000)="1f0000000104ff00fd4354c007", 0xd) r13 = socket$key(0xf, 0x3, 0x2) dup2(r13, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r14 = socket(0x0, 0x0, 0x0) write(r14, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ftruncate(r4, 0x80003) sendfile(r1, r4, &(0x7f00000000c0), 0x8000fffffffe) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in=@empty, @in6=@ipv4={[], [], @broadcast}, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x30, 0x20}, {0x8}, {0x7, 0x3d}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x3}}, 0xe8) [ 173.056191] audit: type=1400 audit(1571330252.255:42): avc: denied { create } for pid=7006 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 173.115977] IPVS: sync thread started: state = BACKUP, mcast_ifn = gre0, syncid = 0, id = 0 [ 173.198710] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 173.240337] audit: type=1400 audit(1571330252.435:43): avc: denied { create } for pid=7018 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_connector_socket permissive=1 16:37:32 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) 16:37:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r2, &(0x7f00000002c0)={{r3, r4/1000+10000}, 0x14, 0x7, 0x7fff}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e22, 0x62d, @empty, 0xffffffff}, {0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0xf}, 0xaf0}, 0x8, [0x1, 0x9, 0x4, 0x32, 0x6, 0x80000001, 0x0, 0x2]}, 0x5c) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000300)=0xd995) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 173.311200] audit: type=1400 audit(1571330252.445:44): avc: denied { write } for pid=7018 comm="syz-executor.3" path="socket:[25539]" dev="sockfs" ino=25539 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 16:37:32 executing program 1: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$USBDEVFS_DISCARDURB(r1, 0x550b, &(0x7f0000000140)=0x401) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000480)={@default, @bcast}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r1, 0x10, &(0x7f0000000180)={&(0x7f0000000340)=""/97, 0x61, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r2, 0x10, &(0x7f0000000400)={&(0x7f0000000240)=""/247, 0xf7, r3}}, 0x10) keyctl$negate(0xd, 0x0, 0x5, r0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) r5 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x8905, &(0x7f0000000100)) ioctl$UFFDIO_WAKE(r4, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000080)={0x34, 0x0, &(0x7f0000000040)}) [ 173.387892] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 173.465400] ubi0: attaching mtd0 16:37:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x8) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f68fde88b508405c8647cfc00b3dd647f450000000000000000fb0000000000004029588171101000720455fd36f6b81ef2589eb7105c209bbe0b10001600380001c90400"], 0x45) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) sendto$inet6(r2, &(0x7f00000000c0)="5817f39342c815541363b8599735542c035ac48807da4fc1cb1f88c6", 0x1c, 0x0, &(0x7f0000000100)={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) [ 173.506387] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 173.586312] ubi0: attaching mtd0 [ 173.589810] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 173.627762] ubi0: attaching mtd0 [ 173.644796] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xe080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) [ 173.677557] ubi0: attaching mtd0 [ 173.684521] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0xffff, 0xd99, @rand_addr="0e647a3eb18a0caef8477689230efa44"}, 0xfffffffffffffe5d) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x66880, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000100)={0x2e, 0x4, 0x0, {0x4, 0x381, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10}, {}, {0x0, 0x0, 0x800}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={[], [], @multicast2}, 0x0, 0x3c}, 0x0, @in=@rand_addr=0xffffff1f, 0x0, 0x0, 0x0, 0x5a, 0xfffffffffffffffe, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000180)={0x1, 0x0, {0x0, 0x3, 0x2, 0x1, 0x3}}) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r3, 0x1, 0x67c94eec898c12, &(0x7f0000000000)=0x7ff, 0x4) 16:37:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000002d00), 0x80000000000027a, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x400000000000302, 0x4008800) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000001c0)=""/164) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@remote, @loopback, @local, 0x2, 0x80, 0x3ff, 0x780, 0x7, 0x80, r5}) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) ioctl$ASHMEM_GET_PIN_STATUS(r7, 0x7709, 0x0) ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000080)=0x7) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x1, @addr=0x8}, 0x8, 0x6, 0x1000}) 16:37:33 executing program 2: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x803, 0xff) syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000200)=0xc) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040), 0x0) sendfile(r1, r0, 0x0, 0x72439a6b) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xfffffffc}}, 0xb8}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)=0x0) r4 = syz_open_procfs(r3, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:37:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r2, &(0x7f00000002c0)={{r3, r4/1000+10000}, 0x14, 0x7, 0x7fff}, 0x18) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000340)={{0xa, 0x4e22, 0x62d, @empty, 0xffffffff}, {0xa, 0x4e21, 0x400, @dev={0xfe, 0x80, [], 0xf}, 0xaf0}, 0x8, [0x1, 0x9, 0x4, 0x32, 0x6, 0x80000001, 0x0, 0x2]}, 0x5c) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000300)=0xd995) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 173.816017] ubi0: attaching mtd0 16:37:33 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f00000000c0)={0x4, 0x1, @stop_pts=0x6f}) write$binfmt_elf64(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x278) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000140)={0x90, 0xfffffffffffffffe, 0x1, {0x2, 0x0, 0x1, 0x0, 0x0, 0x0, {0x5, 0x200, 0x5, 0x0, 0x0, 0x0, 0x3ff, 0x1, 0xfffffff7, 0x3, 0x8001, 0x0, 0xffffffffffffffff, 0x0, 0x29552b60}}}, 0x90) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 16:37:33 executing program 1: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) getpgrp(r0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x4000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x9) r1 = socket(0x11, 0x2, 0x0) r2 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, 0x0) r3 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r1) ioctl$NBD_SET_SIZE_BLOCKS(r3, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r3, 0xab03) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) ftruncate(0xffffffffffffffff, 0x1000000) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) memfd_create(&(0x7f0000000040)='\x00', 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) io_setup(0x4, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) r4 = dup(0xffffffffffffffff) mmap(&(0x7f000000e000/0x6000)=nil, 0x6000, 0x0, 0x10, r4, 0x0) r5 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) dup(r8) mmap(&(0x7f000000e000/0x6000)=nil, 0x6000, 0x0, 0x30051, 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x0, 0x0) [ 173.848371] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:33 executing program 3: socket(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) bind$isdn(r2, &(0x7f0000003700)={0x22, 0x29, 0x3, 0x3f, 0x7}, 0x6) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xc2, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x5}}, 0x0) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) recvmmsg(r4, &(0x7f0000005540)=[{{&(0x7f0000000300)=@pptp, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)=""/30, 0x1e}, {&(0x7f00000003c0)=""/47, 0x2f}, {&(0x7f0000000400)=""/115, 0x73}, {&(0x7f0000000480)=""/156, 0x9c}, {&(0x7f0000000540)=""/246, 0xf6}], 0x5, &(0x7f0000000700)=""/62, 0x3e}, 0x7ff}, {{&(0x7f0000000740)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000028c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/223, 0xdf}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x3, &(0x7f0000002900)=""/101, 0x65}, 0x343}, {{&(0x7f0000002980)=@tipc=@name, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002a00)=""/180, 0xb4}, {&(0x7f0000002ac0)=""/179, 0xb3}], 0x2}, 0x5}, {{&(0x7f0000002bc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002c40)=""/205, 0xcd}, {&(0x7f0000002d40)=""/210, 0xd2}, {&(0x7f0000002e40)=""/95, 0x5f}, {&(0x7f0000002ec0)=""/88, 0x58}, {&(0x7f0000002f40)=""/166, 0xa6}, {&(0x7f0000003000)=""/181, 0xb5}], 0x6, &(0x7f0000003140)=""/189, 0xbd}, 0x9}, {{&(0x7f0000003200)=@un=@abs, 0x80, &(0x7f00000035c0)=[{&(0x7f0000003280)=""/160, 0xa0}, {&(0x7f0000003340)=""/170, 0xaa}, {&(0x7f0000003400)=""/234, 0xea}, {&(0x7f0000003500)=""/155, 0x9b}], 0x4, &(0x7f0000003600)=""/126, 0x7e}, 0x194}, {{&(0x7f0000003680)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x26, &(0x7f0000003700)}, 0x200000}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000003740)=""/191, 0xbf}, {&(0x7f0000003800)=""/177, 0xb1}, {&(0x7f00000038c0)=""/124, 0x7c}, {&(0x7f0000003940)=""/224, 0xe0}, {&(0x7f0000003a40)=""/5, 0x5}, {&(0x7f0000003a80)=""/92, 0x5c}], 0x6, &(0x7f0000003b80)=""/73, 0x49}, 0x4c}, {{0x0, 0x0, &(0x7f0000003c80)=[{&(0x7f0000003c00)=""/44, 0x2c}, {&(0x7f0000003c40)=""/62, 0x3e}], 0x2, &(0x7f0000003cc0)=""/178, 0xb2}, 0x5}, {{0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000003d80)=""/173, 0xad}, {&(0x7f0000003e40)=""/57, 0x39}, {&(0x7f0000003e80)=""/206, 0xce}], 0x3, &(0x7f0000003fc0)=""/77, 0x4d}, 0x8000}, {{&(0x7f0000004040)=@l2, 0x80, &(0x7f0000005300)=[{&(0x7f00000040c0)=""/16, 0x10}, {&(0x7f0000004100)=""/17, 0x11}, {&(0x7f0000004140)=""/149, 0x95}, {&(0x7f0000004200)=""/4096, 0x1000}, {&(0x7f0000005200)=""/204, 0xcc}], 0x5, &(0x7f0000005380)=""/69, 0x45}, 0x401}], 0xa, 0x100, &(0x7f0000005400)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005800)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000057c0)={&(0x7f0000005840)=ANY=[@ANYBLOB="780000007050eee2befda5031e9c2400040025bd7000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="0300edff0d000300ffff0e00080005000501000008000500062000002c0008001c0001000209c2ee01800000020000001f00000080000000030000000c000200ad4603000100000008000e00ff0f0000080005002009000008000d00ffffff7f"], 0x78}, 0x1, 0x0, 0x0, 0x20000044}, 0x84002) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) ioctl$USBDEVFS_GET_SPEED(0xffffffffffffffff, 0x551f) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=@newtfilter={0x38, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {}, {}, {0x3}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0xc, 0x2, [@TCA_U32_HASH={0x8}]}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 173.974975] block nbd1: Receive control failed (result -22) [ 173.986650] ubi0: attaching mtd0 [ 173.998705] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:33 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = open(0x0, 0x0, 0x2) getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0xfffffffffffffffe) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)=0x0) sched_setattr(r2, &(0x7f0000000040)={0xfffffffffffffd79, 0x1, 0x0, 0x0, 0x5, 0x0, 0x200000000, 0xfffffffffffffff8}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket(0x1, 0x80005, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r5, 0x2c, &(0x7f0000000080)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x0, r4, &(0x7f0000000200), 0x121}]) io_getevents(r5, 0xffff, 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000180)={0x0, 0x1c9c380}) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x5, 0x4, 0x0, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x1ff, 0x9}, 0x10001, 0x0, 0x2, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000240)='em1\x00', r8}, 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 174.024987] audit: type=1400 audit(1571330253.225:45): avc: denied { write } for pid=7081 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 16:37:33 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) socket$packet(0x11, 0xa, 0x300) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffffffffffeb3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x12, r1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000680)='mem\x00\x00\x00\x00\x00\x00<\xa71\b{c+\xd4\xd7s\x8c\')tU\x19\x9a)Sc\x1f\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xfb\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14\xe10_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x84\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\xbe\x15.\x81\x87m\"\xaa\xce\xed\a\xf2\xfd<\x06\x00\x00\x00\x00\x00\x00\x00\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0azz\xeeA\x91^\x9a\x11J\x04\xd4\xfb\xcc-\x04w\xf5\x1d|\xea\x18\x83v?P\xbf\xef\x11\xcbe\x17\x94z)Y\x89r\x96\xa9e[\x8c8\x03u\x99\\_\xa43W\xd7\xb9\fU1\xf4\xf2\xfcV\xec[\xbb/T\x7f#\xaa\xbaJ\x0f\xf8\xe7\xc3\x89\xc7=Oz\x85\x19&\xf5\xf2\xe4\x9f\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\x8c\xf4eR_\xa7\x1b\xe6\xba\xc4\xca`\xafw\xe1\x1e\x16\x83=\xeeQ\x83\xcc\na\x17\x9f\x852\xb4WB*\x88#\xb7\bbS\xb0\xbb7\xcd\xa4M\b\x84K\xde3\x00\xb4y\x9e/V\xd3\xe1f\xcd\xe8\x1a\xdd\xd2\xf2!\xc0\xb5\xc1\xbd\a\a\xe3zV\xd9\xd8\xc2\xef\x94\n\xd8\xd87(\xc5:;R \x1a\xe2\xe8:\xd7\xc19\xb3\xbb\xc0ol\x93W[\xc2[\xd8\xa3\xfb\xa3\xb5iR\x9d%6\x03\xa8\xf9\x95\a#\n', 0x275a, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x40, 0x200) r3 = syz_open_dev$admmidi(0x0, 0x0, 0x100) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000140)={r5, &(0x7f00000000c0)=""/116}) ioctl$DRM_IOCTL_UNLOCK(r4, 0x4008642b, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000340)={0xfffffffffffffffd, 0xd000}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) openat(r4, &(0x7f0000000180)='./file0\x00', 0x30300, 0x84) r7 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r7) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000001c0)={0xffffffffffffffff, 0x4e63, 0xe0000000000, r7}) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r8, 0xc0f85403, 0x0) unshare(0x40000000) setsockopt$inet_udp_encap(r6, 0x11, 0x64, 0x0, 0xfffffffffffffda0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1, {}, 0x2000}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1000000000000080, 0x0) 16:37:33 executing program 5: msgget$private(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46802) io_setup(0x0, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000000)=0x80) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) socket$inet(0x10, 0x2, 0x0) ftruncate(r1, 0x48280) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r3, 0x890b, &(0x7f0000000280)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @null, @null]}) ioctl$KVM_GET_REG_LIST(r5, 0xc008aeb0, &(0x7f0000000240)={0x1, [0xed8]}) r6 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x15) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x87fffff, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:37:33 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026, r0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7f, 0x37b4bc7d, 0xac}) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000030050000d002000000000000b8010000b8030000b8030000980400009804000098040000980400009804000006000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500"/80], @ANYBLOB="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"], 0x590) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x8f) r2 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0x20) r3 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r3, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x15, 0x1, 0xffffffff, &(0x7f0000000100)=[0x0, 0x0], 0x2}, 0x20) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) socket$netlink(0x10, 0x3, 0x2) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f0000000380)={0xa927}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40000012, 0xffffffffffffffff, 0x0) [ 174.110555] ubi0: attaching mtd0 [ 174.119591] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x14080) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x4, @mcast2, 0x9}}, 0x9, 0xffff0000, 0xa0000000, 0x4, 0x2aef}, &(0x7f00000000c0)=0x98) ioctl$USBDEVFS_RESET(r1, 0x5514) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @remote}, &(0x7f00000001c0)=0xc) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x4}}, 0x20}}, 0x0) rmdir(&(0x7f00000002c0)='./file0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) [ 174.176789] block nbd1: shutting down sockets [ 174.205003] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure [ 174.230546] protocol 88fb is buggy, dev hsr_slave_0 [ 174.235963] protocol 88fb is buggy, dev hsr_slave_1 [ 174.250075] audit: type=1804 audit(1571330253.455:46): pid=7122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/11/bus" dev="sda1" ino=16559 res=1 [ 174.277043] block nbd1: Receive control failed (result -22) [ 174.283094] nbd1: detected capacity change from 0 to 7168 [ 174.291336] block nbd1: Attempted send on invalid socket [ 174.296890] block nbd1: shutting down sockets 16:37:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x204) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x10, &(0x7f0000000180)={&(0x7f0000000140)=""/33, 0x21, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r2, 0x10, &(0x7f0000000200)={&(0x7f0000000040)=""/227, 0xe3, r3}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r4, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22bfffffff}, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) writev(r0, &(0x7f0000003280)=[{&(0x7f0000000240)="580000001400192340834b80043f679a10ffff7f4e32f61bcdf1e422000000000100804824cabecc4b381eaadc28f2346ae792945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00fff9ffffff0010", 0xfff7}], 0x1) lsetxattr$trusted_overlay_opaque(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) [ 174.301747] print_req_error: I/O error, dev nbd1, sector 0 [ 174.307548] Buffer I/O error on dev nbd1, logical block 0, async page read [ 174.319670] print_req_error: I/O error, dev nbd1, sector 2 [ 174.326329] Buffer I/O error on dev nbd1, logical block 1, async page read [ 174.334407] print_req_error: I/O error, dev nbd1, sector 4 [ 174.334424] Buffer I/O error on dev nbd1, logical block 2, async page read [ 174.334494] print_req_error: I/O error, dev nbd1, sector 6 [ 174.352874] Buffer I/O error on dev nbd1, logical block 3, async page read [ 174.360339] print_req_error: I/O error, dev nbd1, sector 0 [ 174.366012] Buffer I/O error on dev nbd1, logical block 0, async page read [ 174.369554] audit: type=1804 audit(1571330253.525:47): pid=7122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/11/bus" dev="sda1" ino=16559 res=1 [ 174.373522] print_req_error: I/O error, dev nbd1, sector 2 [ 174.405657] Buffer I/O error on dev nbd1, logical block 1, async page read [ 174.412740] print_req_error: I/O error, dev nbd1, sector 4 [ 174.418368] Buffer I/O error on dev nbd1, logical block 2, async page read [ 174.425667] Buffer I/O error on dev nbd1, logical block 3, async page read [ 174.433554] print_req_error: I/O error, dev nbd1, sector 0 [ 174.439635] Buffer I/O error on dev nbd1, logical block 0, async page read [ 174.448641] print_req_error: I/O error, dev nbd1, sector 2 16:37:33 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0xdab, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xff}}, 0x2, 0x8b8, 0x80000001, 0x0, 0x1}, 0x98) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)) [ 174.454380] Buffer I/O error on dev nbd1, logical block 1, async page read [ 174.462000] print_req_error: I/O error, dev nbd1, sector 4 [ 174.469287] ldm_validate_partition_table(): Disk read failed. [ 174.476868] Dev nbd1: unable to read RDB block 0 [ 174.482603] nbd1: unable to read partition table [ 174.487601] nbd1: partition table beyond EOD, truncated 16:37:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x0) socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, 0x0, 0x0) socket(0x200000000000011, 0x0, 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) getegid() getgroups(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:37:33 executing program 1: memfd_create(0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x54243, 0x103) accept(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0xa, 0x0) recvmmsg(r1, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/255, 0xff}}, {{&(0x7f0000001900)=@tipc=@id, 0x80, &(0x7f0000003080), 0x0, &(0x7f0000001f80)=""/7, 0x7}}, {{&(0x7f0000003140)=@hci, 0x80, &(0x7f0000001740)=[{&(0x7f0000000440)=""/92, 0x5c}, {&(0x7f00000004c0)=""/155, 0x9b}, {&(0x7f0000001a00)=""/49, 0x31}, {&(0x7f0000000380)=""/11, 0xb}, {&(0x7f0000000580)=""/26, 0x1a}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/235, 0xeb}, {&(0x7f00000016c0)=""/114, 0x72}, {&(0x7f00000031c0)=""/211, 0xd3}], 0x9, &(0x7f0000003480)=""/2, 0x2}, 0xa0ad}, {{0x0, 0x0, &(0x7f0000004900)=[{&(0x7f00000034c0)=""/190, 0xbe}, {&(0x7f0000003580)=""/78, 0x4e}, {&(0x7f0000001e00)=""/134, 0x86}, {&(0x7f0000003680)=""/254, 0xfe}, {&(0x7f0000000200)=""/48, 0x30}, {&(0x7f00000037c0)=""/153, 0x99}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/86, 0x56}], 0x8, &(0x7f0000001a40)=""/211, 0xd3}, 0x5}, {{&(0x7f0000004a80)=@ll, 0x80, &(0x7f0000000240)=[{&(0x7f0000004b00)=""/19, 0x13}], 0x1, &(0x7f0000004b80)=""/78, 0x4e}}], 0x5, 0x40000001, &(0x7f0000004d40)={0x0, 0x1c9c380}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0xed, 0x40000000000000}, 0x0) perf_event_open(0x0, 0x0, 0x200000000, 0xffffffffffffffff, 0x1) r4 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') preadv(r4, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000100)={0x3, &(0x7f00000000c0)="8efea259745ce2e339b7306911006af0c3fa6aef74444f12"}) mkdir(0x0, 0x0) dup(0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') preadv(r5, &(0x7f00000017c0), 0x3a8, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/fib_triestat\x00') preadv(r6, &(0x7f00000017c0), 0x3a8, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000004dc0)={0xd64, 0x0, 0x10000, 0x6000000}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') geteuid() fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 174.562384] IPVS: ftp: loaded support on port[0] = 21 16:37:33 executing program 3: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800002, 0x11, r2, 0x0) getresuid(&(0x7f00000004c0), &(0x7f0000003280), 0x0) fcntl$setstatus(r0, 0x4, 0x45000) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x8200}]) socket$inet_udplite(0x2, 0x2, 0x88) [ 174.602865] overlayfs: failed to resolve './file1': -2 [ 174.631632] protocol 88fb is buggy, dev hsr_slave_0 [ 174.637183] protocol 88fb is buggy, dev hsr_slave_1 [ 174.648945] audit: type=1804 audit(1571330253.635:48): pid=7122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/11/bus" dev="sda1" ino=16559 res=1 [ 174.698894] audit: type=1804 audit(1571330253.635:49): pid=7122 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/11/bus" dev="sda1" ino=16559 res=1 [ 174.909700] audit: type=1800 audit(1571330253.815:50): pid=7146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=16562 res=0 [ 175.110138] protocol 88fb is buggy, dev hsr_slave_0 [ 175.115334] protocol 88fb is buggy, dev hsr_slave_1 16:37:34 executing program 3: syz_mount_image$xfs(&(0x7f00000006c0)='xfs\x00', &(0x7f0000000700)='./file1\x00', 0x4000000000000000, 0x1, &(0x7f0000000980)=[{&(0x7f0000000000)="584653428af75a4cd53f818554e299fab20000004c0000ff72cef4307613b6d53fd5b8d497696803272b4792bc7e0128b3be68091b8fb28375b8c2b8d400b5a1b37d947f0bfe222154d9d931a36ef513b156d56120692be12cd4ee385546ba87c550bf02748ed0", 0x67}], 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r2, 0x400, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x5, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20080080}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x300, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x1000, 0x5, 0x7f}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000000}, 0x10) 16:37:34 executing program 1: close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0xe, 0x84) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000700)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r2, 0x29, 0x33, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r2, 0x400000001ffffffd) r3 = socket$inet6(0xa, 0x6, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x100) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) pipe(&(0x7f0000000700)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) 16:37:34 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) socket$packet(0x11, 0xa, 0x300) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffffffffffeb3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x12, r1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000680)='mem\x00\x00\x00\x00\x00\x00<\xa71\b{c+\xd4\xd7s\x8c\')tU\x19\x9a)Sc\x1f\xce\xd8\xde\x95\xf6\xc3\\n\xc1\xa2)o\xee\x97\xdf\xe9\xfb\xfdJ\xe8`7iY\x86~\xd8\xecy\xc00.\x90\xfc\xac\xa0\xb8\x1d\x1a\x7f\xec\xea\np\xb4\xd5l\xb5\xc3\xc7w%\x16a~]P\x04\xc7 \xf7\x92\x8b\x8f\x9d&\\\xf9\xa3\x96G<\xd4\x80\x16/\x81\xe7(\x8b\xde9]\xaf\xbc\xb0\r}Ne\xfaX\xb0\x8a\xbd\x1d\xfc\xd4\x91\x95\x00\v\x14\xe10_\xd9\x1f\xc7\xb5\xc3FS\x16\x03~\xbbc*\xa3\xab`\x06\xf0\xbc\xacJY\xe7\xb2\x8cw\xa4U.\xa4\xe2u\x1d!jVL}#O\t\xb2`\x0e\xe9\xc6*\xf7\xf8Uh\x8e\x01\xf1b\xf5;\x8a\x17\x84\x0fq\x01\x91pSR\x82-H\n\x1fP\xb6*\xc9\xfd\x89\xb5\x7f\xbe\x15.\x81\x87m\"\xaa\xce\xed\a\xf2\xfd<\x06\x00\x00\x00\x00\x00\x00\x00\xdd\xcd#8\"\x8b\xf2\xccA\v\xdf\xf5\x8d\xa5-\x02\xaa|\xdd\xd0azz\xeeA\x91^\x9a\x11J\x04\xd4\xfb\xcc-\x04w\xf5\x1d|\xea\x18\x83v?P\xbf\xef\x11\xcbe\x17\x94z)Y\x89r\x96\xa9e[\x8c8\x03u\x99\\_\xa43W\xd7\xb9\fU1\xf4\xf2\xfcV\xec[\xbb/T\x7f#\xaa\xbaJ\x0f\xf8\xe7\xc3\x89\xc7=Oz\x85\x19&\xf5\xf2\xe4\x9f\xb8\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa6\x8c\xf4eR_\xa7\x1b\xe6\xba\xc4\xca`\xafw\xe1\x1e\x16\x83=\xeeQ\x83\xcc\na\x17\x9f\x852\xb4WB*\x88#\xb7\bbS\xb0\xbb7\xcd\xa4M\b\x84K\xde3\x00\xb4y\x9e/V\xd3\xe1f\xcd\xe8\x1a\xdd\xd2\xf2!\xc0\xb5\xc1\xbd\a\a\xe3zV\xd9\xd8\xc2\xef\x94\n\xd8\xd87(\xc5:;R \x1a\xe2\xe8:\xd7\xc19\xb3\xbb\xc0ol\x93W[\xc2[\xd8\xa3\xfb\xa3\xb5iR\x9d%6\x03\xa8\xf9\x95\a#\n', 0x275a, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x40, 0x200) r3 = syz_open_dev$admmidi(0x0, 0x0, 0x100) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000140)={r5, &(0x7f00000000c0)=""/116}) ioctl$DRM_IOCTL_UNLOCK(r4, 0x4008642b, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r3, 0x4010aeab, &(0x7f0000000340)={0xfffffffffffffffd, 0xd000}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) openat(r4, &(0x7f0000000180)='./file0\x00', 0x30300, 0x84) r7 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r7) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000001c0)={0xffffffffffffffff, 0x4e63, 0xe0000000000, r7}) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r8, 0xc0f85403, 0x0) unshare(0x40000000) setsockopt$inet_udp_encap(r6, 0x11, 0x64, 0x0, 0xfffffffffffffda0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000080)={0x1, {}, 0x2000}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1000000000000080, 0x0) [ 175.342556] XFS (loop3): bad version [ 175.350194] protocol 88fb is buggy, dev hsr_slave_0 [ 175.355279] protocol 88fb is buggy, dev hsr_slave_1 [ 175.362809] XFS (loop3): SB validate failed with error -22. 16:37:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x4, 0x2) read$usbfs(r0, &(0x7f0000000040)=""/18, 0x12) [ 175.485636] audit: type=1400 audit(1571330254.685:51): avc: denied { name_bind } for pid=7183 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 16:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in=@empty}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000005c0)=0x6) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f00000002c0)={'gre0\x00', {0x2, 0x4e21}}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000002000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in]}, &(0x7f0000000240)=0x10) r6 = dup2(0xffffffffffffffff, r4) dup3(r6, r3, 0x0) r7 = socket(0x2, 0x1, 0x0) r8 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000080)={0x60000000}) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r9, 0x40186f40, 0x76002d) r10 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r10, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r10, 0x84, 0xf, &(0x7f00000004c0)={r5, @in6={{0xa, 0x4e24, 0x8, @local, 0x9}}, 0x5, 0x6, 0x4, 0x7fffffff, 0x3}, &(0x7f0000000580)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r9, 0x84, 0x6, &(0x7f0000000600)={r11, @in6={{0xa, 0x4e24, 0x0, @local, 0x80}}}, &(0x7f00000006c0)=0x84) epoll_pwait(r8, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) shutdown(r7, 0x0) write$selinux_create(r6, &(0x7f00000001c0)=ANY=[@ANYBLOB='system_u:object_r:modules_object_t:U0 /usr/sbin/ntpd 02000000000000000005\x00'], 0x4a) r12 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/wireless\x00') preadv(r12, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={r5, @in6={{0xa, 0x4e20, 0xfffffffe, @rand_addr="e71c51d6a99bcaadcc47171d0282ad1a", 0x7f}}, 0x5, 0x61ae, 0x2, 0x8}, 0x98) [ 175.990491] protocol 88fb is buggy, dev hsr_slave_0 [ 175.995940] protocol 88fb is buggy, dev hsr_slave_1 [ 176.090932] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 176.176336] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 176.189061] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 176.212727] BFS-fs: bfs_fill_super(): Inode 0x00000004 corrupted [ 176.246087] syz-executor.3 (7204) used greatest stack depth: 24400 bytes left 16:37:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0)=0x80000001, 0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000040)) splice(r1, 0x0, r0, 0x0, 0xa3, 0x0) 16:37:35 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0xffffffffffffff09}, 0xfddf) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)=0x1, 0x4) r4 = getegid() mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='fuseblk\x00', 0x20, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xffffffffffffffe0}}], [{@smackfshat={'smackfshat', 0x3d, 'team\x00'}}, {@hash='hash'}]}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f0000000240)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) prctl$PR_GET_SECCOMP(0x15) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r6, &(0x7f0000007e00), 0x400000000000058, 0x0) 16:37:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="8da4363ac0ed0200000000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d1f1d029d62a99fecbc9dbca1d918967d9cae7effd3059b5635bd007b5f2741a1f6f57f829e75abe59c978539cf5384fec60f079b62ee94bfba6a16f7e31982db737877e89e7b5222d07d773e8586f1b2cd783834118f845c2451f6e41e38896e48f447472ab68b77c366736e04050532b090942d7174779f115a63a26e1ec988699f8bc2099eacc29653b17fc237bdc714d5c1", 0xdb, 0x10000}], 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000000c0)=0x3, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000140)={0x0, 0x8, "e9c318fcbfece62c4b26c4b6c3dac14fe8e9357627ca08d20fc0f893fc33a945", 0x5, 0xffffffff, 0x7, 0x6af2bd67, 0x6, 0x2, 0x400, 0x7f, [0x5, 0x7, 0x5, 0x1]}) 16:37:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) fsync(r0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x1a3204, 0x143) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000003840)=[{{&(0x7f00000002c0)=@nfc, 0x80, &(0x7f0000001580)=[{&(0x7f00000003c0)=""/174, 0xae}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000480)=""/4088, 0xff8}, {&(0x7f0000001480)=""/191, 0xbf}, {&(0x7f0000000340)}, {&(0x7f00000039c0)=""/2, 0x2}], 0x6}, 0x5}, {{0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001600)=""/178, 0xb2}, {&(0x7f00000016c0)=""/16, 0x10}], 0x2, &(0x7f0000001740)=""/117, 0x75}, 0x6}, {{&(0x7f00000017c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001840)=""/203, 0xcb}, {&(0x7f0000001940)=""/200, 0xc8}, {&(0x7f0000001a40)=""/162, 0xa2}, {&(0x7f0000001b00)=""/81, 0x51}, {&(0x7f0000001b80)=""/245, 0xf5}, {&(0x7f0000003a00)=""/73, 0x49}], 0x6, &(0x7f0000001d80)=""/4096, 0x1000}, 0x7fff}, {{&(0x7f0000002d80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002e00)=""/216, 0xd8}, {&(0x7f0000002f00)=""/126, 0x7e}, {&(0x7f0000002f80)=""/14, 0xe}], 0x3, &(0x7f0000003000)=""/130, 0x82}, 0x1}, {{&(0x7f00000030c0)=@x25={0x9, @remote}, 0x80, &(0x7f0000003180)=[{&(0x7f0000003140)=""/12, 0xc}], 0x1, &(0x7f00000031c0)=""/147, 0x93}, 0x8}, {{&(0x7f0000003280)=@nfc_llcp, 0x80, &(0x7f0000003700)=[{&(0x7f0000003300)}, {&(0x7f0000003340)=""/113, 0x71}, {&(0x7f00000033c0)=""/56, 0x38}, {&(0x7f0000003400)=""/241, 0xf1}, {&(0x7f0000003500)=""/85, 0x55}, {&(0x7f0000003580)=""/11, 0xb}, {&(0x7f00000035c0)=""/105, 0x69}, {&(0x7f0000003640)=""/150, 0x96}], 0x8, &(0x7f0000003780)=""/168, 0xa8}, 0x5}], 0x6, 0xc34ddae71888f291, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = socket$inet(0xa, 0x801, 0x84) connect$inet(r5, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) msgget$private(0x0, 0x4) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, 0x0, &(0x7f0000cab000)) 16:37:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_triestat\x00') pipe(0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e22, @rand_addr=0x2}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) io_setup(0x0, 0x0) io_submit(0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x4e21, @remote}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 176.522816] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 10863435045939612575 transid 17050532955254037791 /dev/loop1 [ 176.688959] BTRFS error (device loop1): unsupported checksum algorithm 7790 [ 176.735961] BTRFS error (device loop1): superblock checksum mismatch 16:37:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00'}, 0x48) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000000c0), 0x4) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000140)=r5, 0x4) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) sendto$inet(r7, 0x0, 0x0, 0x900000024000985, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) 16:37:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000002580)=0xffffffffffffac6e, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x141200, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={r4, 0x8, 0x1}, &(0x7f0000000080)=0x8) [ 176.891215] BTRFS error (device loop1): open_ctree failed [ 176.930203] ubi0: attaching mtd0 [ 176.958911] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 176.986438] BTRFS error (device loop1): unsupported checksum algorithm 7790 [ 177.050331] BTRFS error (device loop1): superblock checksum mismatch [ 177.091867] ubi0: attaching mtd0 [ 177.095381] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)={0x3d, 0x0, 0x7, "cecbc0d7986d6c7ba0dfd1ba89351177ec40b33e7d8c4ab23bea6489cad9e724bbf5de00b2458ed0af2392921694b88dd0e42430a1b3a4e5e12a649020"}) [ 177.196117] BTRFS error (device loop1): open_ctree failed 16:37:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400070500"/20, @ANYRES32=r8, @ANYBLOB="000000010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="740000002800210400"/20, @ANYRES32=r8, @ANYBLOB="0400000000000000000000000c00e6006367726f7570000044000200400002003c000100"/92], 0x74}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000e40)=@deltfilter={0x154, 0x28, 0x421, 0x0, 0x0, {0x0, r8, {0x4}}, [@filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x124, 0x2, [@TCA_FLOW_MASK={0x8}, @TCA_FLOW_DIVISOR={0x8}, @TCA_FLOW_ACT={0x100, 0x9, @m_nat={0xfc, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, @TCA_NAT_PARMS={0x28, 0x1, {{}, @empty, @remote}}}, {0xc0, 0x6, "e44d312b1871cbd8358d56bc81b45779028bfc6e7c9c107964030a02bca5d79137f0c9d98373984f3d2020b5afd130f143e629cd62e896efa63661fd916e9a451dc8f16615b857662f9f8087e734dda178bc5f81bc3b5328b3324cffbc4a7799aa23950eed406ca03e180329d69f1843c8fdeba5bd81cfe8c98d689b8dfa7ee8681c8894b9572c1ff5170048e4843c0d1290c3167d0241f0288cd1a7a94e7741454e91d7eff47a68ccf17b5e8c8a6cba70a88744077be9184f3826"}}}}, @TCA_FLOW_BASECLASS, @TCA_FLOW_PERTURB={0x8}]}}]}, 0x154}}, 0x0) 16:37:36 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x2c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000500)='./file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) creat(0x0, 0x0) open(0x0, 0x2fc, 0x0) flock(0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000540)={'IDLETIMER\x00'}, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x80) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x2) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file2\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="66743d82795626ad8a9378b76204e0a2b9e687c413355650077c5e3cd4bcfa4395fc58906bb3b34c69cc60bc637ba44a00f07c46d571539f5e537e4f83e1320000000000000000000000007d592e", @ANYBLOB]) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f00000000c0)={0x3ff}) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) [ 177.370904] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 177.392640] syz-executor.3 (7234) used greatest stack depth: 24144 bytes left 16:37:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x182) r2 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x2000005) dup3(r0, r1, 0x0) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) 16:37:36 executing program 5: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) pause() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000000c0)='./file1\x00', 0x220141042, 0x0) ftruncate(r2, 0x280080) sendfile(r1, r2, 0x0, 0x2008000fffffffe) [ 177.584185] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 16:37:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 16:37:36 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() move_pages(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:37:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001e000500d25a80648c63940d0200fc00100006400200a06d053582c137153e370900018002000000d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x80000, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x1f, 0x0, 0x80000001, 0xc7, 0xfff, 0x5, "c6d7de85a61d9ae7a0c3e13bf628437051c7900d44a298c67c614d4a311b54"}, 0x137) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r3) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x12f}]) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f00000003c0)={r3, 0x4}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r5, 0x891a, &(0x7f0000000000)={'veth1_to_team\x00', {0x2, 0x4e23, @remote}}) [ 177.827625] overlayfs: filesystem on './file1' not supported as upperdir 16:37:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00^\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) add_key$keyring(0x0, &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0x0) 16:37:37 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) write$selinux_attr(r0, &(0x7f0000000080)='system_u:object_,g\xb4\xbau\x94\xd1\xbb\n\xd8t\x1b{r:useradd_exec_t:s0\x00', 0x31) ftruncate(r0, 0x108200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x4000, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 16:37:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x102000}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="d3aaffae741a32f50378452634721df90ca2c482fdc0751cca0c8a732c8e91") syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff49, 0x0, 0x0, 0xfffffffffffffe15) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000)=0x9, 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) [ 178.105465] kauditd_printk_skb: 8 callbacks suppressed [ 178.105474] audit: type=1804 audit(1571330257.305:60): pid=7351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/9/bus" dev="sda1" ino=16578 res=1 16:37:37 executing program 1: clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet(0x2, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820f050000003292ea54c7beef915d564c90c200", 0x18) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_to_bond\x00'}, 0x18) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) [ 178.297954] kvm: emulating exchange as write [ 178.324034] audit: type=1804 audit(1571330257.425:61): pid=7351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/9/bus" dev="sda1" ino=16578 res=1 16:37:37 executing program 1: clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x18) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) 16:37:37 executing program 2: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) [ 178.596141] 8021q: VLANs not supported on lo 16:37:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffc37b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000bc0)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000300)={0x0, 0x100000201, 0x1000000000}, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) getpeername(r0, 0x0, &(0x7f0000000080)) keyctl$session_to_parent(0x12) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, r1, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(0xffffffffffffffff, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x200, 0x0) setsockopt$inet_dccp_buf(r3, 0x21, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast1}, {0x2, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, r4}}, 0x48) 16:37:37 executing program 1: semget$private(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x80800) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000003c0)={@initdev, @loopback}, &(0x7f0000000400)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @multicast1}, @IFA_FLAGS={0x8, 0x3}]}, 0x28}}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@initdev}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002000)={'lapb0\x00'}) [ 178.623856] audit: type=1804 audit(1571330257.825:62): pid=7384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir068219447/syzkaller.OeQhzL/12/bus" dev="sda1" ino=16580 res=1 16:37:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x264, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/108, 0x6c}], 0x1) sendto$inet(r0, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) 16:37:37 executing program 5: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) 16:37:37 executing program 2: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) [ 178.782857] audit: type=1400 audit(1571330257.985:63): avc: denied { map } for pid=7388 comm="syz-executor.0" path="/dev/ashmem" dev="devtmpfs" ino=501 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 16:37:38 executing program 1: 16:37:38 executing program 5: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) 16:37:38 executing program 1: [ 178.929491] audit: type=1804 audit(1571330258.125:64): pid=7411 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir068219447/syzkaller.OeQhzL/13/bus" dev="sda1" ino=16590 res=1 16:37:38 executing program 2: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) [ 178.977568] ucma_write: process 41 (syz-executor.0) changed security contexts after opening file descriptor, this is not allowed. 16:37:38 executing program 1: 16:37:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = dup2(r0, r1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x20) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, 0x0, &(0x7f0000000200)) ioctl$TCSETS2(r2, 0x402c542b, 0x0) [ 179.096349] audit: type=1804 audit(1571330258.225:65): pid=7420 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/18/bus" dev="sda1" ino=16592 res=1 16:37:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x3b7) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r3 = socket$inet(0x10, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 16:37:38 executing program 2: socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x81a6e1d848b3c6c3, 0x0) futimesat(r0, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4400, 0x0) chown(0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) [ 179.308008] audit: type=1804 audit(1571330258.385:66): pid=7426 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir068219447/syzkaller.OeQhzL/14/bus" dev="sda1" ino=16574 res=1 [ 179.346412] net_ratelimit: 2 callbacks suppressed 16:37:38 executing program 5: [ 179.346422] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 179.489154] audit: type=1804 audit(1571330258.575:67): pid=7444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir068219447/syzkaller.OeQhzL/15/bus" dev="sda1" ino=16574 res=1 16:37:38 executing program 3: 16:37:38 executing program 2: 16:37:38 executing program 1: 16:37:38 executing program 5: 16:37:38 executing program 3: 16:37:38 executing program 2: 16:37:38 executing program 5: 16:37:38 executing program 1: 16:37:39 executing program 3: 16:37:39 executing program 0: 16:37:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001980)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 16:37:39 executing program 2: 16:37:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') getdents64(r0, &(0x7f0000000100)=""/179, 0x2c9) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") 16:37:39 executing program 3: 16:37:39 executing program 0: 16:37:39 executing program 2: 16:37:39 executing program 1: 16:37:39 executing program 3: 16:37:39 executing program 2: 16:37:39 executing program 0: 16:37:39 executing program 1: 16:37:39 executing program 3: 16:37:39 executing program 2: 16:37:39 executing program 0: [ 180.130297] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 180.233202] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 180.254299] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 180.267940] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 180.289776] EXT4-fs error (device loop5): ext4_iget:4712: inode #2: comm syz-executor.5: root inode unallocated [ 180.313057] EXT4-fs (loop5): get root inode failed [ 180.327584] EXT4-fs (loop5): mount failed 16:37:39 executing program 5: 16:37:39 executing program 1: 16:37:39 executing program 3: 16:37:39 executing program 2: 16:37:39 executing program 0: 16:37:39 executing program 3: 16:37:39 executing program 1: 16:37:39 executing program 2: 16:37:39 executing program 3: 16:37:39 executing program 2: 16:37:39 executing program 5: 16:37:39 executing program 0: 16:37:39 executing program 1: 16:37:39 executing program 0: 16:37:39 executing program 5: 16:37:39 executing program 2: 16:37:39 executing program 3: 16:37:39 executing program 1: 16:37:39 executing program 5: 16:37:39 executing program 0: 16:37:39 executing program 2: 16:37:39 executing program 3: 16:37:39 executing program 1: 16:37:39 executing program 0: 16:37:39 executing program 2: 16:37:39 executing program 5: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x0) 16:37:40 executing program 3: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='\xab\x05\xae\xa8\x17\xe4\x93\xf4\xe4a\xa2(\t\x00\x81\xafu', 0x0) r1 = dup(r0) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 16:37:40 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="03df358b506d6cafc3d31b9573281e87b9d9e03aaade5d7515b73820d2fd72f3c0f7916faff17a4248bd8378ff0d9ff969ea0f351f46a21ca8077f54e4d9973dec1ff001664975f2cb87f71fe734861ef868abdd2005e4a0bef70eee74143987e52c8299fe07ac3613127bea40dc83c27c9d1373965c7764339f396c3befc406a6d396db1b1db182a5ba417a6c4879b5111c64", @ANYRES64, @ANYRESOCT, @ANYBLOB="7d6eefa92389a0a81bfbcbf2462e2bcb7b9c02504e058f"], 0xc9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1248, 0x11, 0x0, 0x27) 16:37:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)={0x3d, 0x0, 0x7, "cecbc0d7986d6c7ba0dfd1ba89351177ec40b33e7d8c4ab23bea6489cad9e724bbf5de00b2458ed0af2392921694b88dd0e42430a1b3a4e5e12a649020"}) 16:37:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) sendmmsg$inet(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000c80)={0x2, 0x0, @empty}, 0xd, 0x0}}], 0x3ffffffffffff2b, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_getevents(r2, 0xd81, 0x4, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0) 16:37:40 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x80) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2024820, &(0x7f0000000600)=ANY=[@ANYBLOB='t']) 16:37:40 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) open_by_handle_at(r1, &(0x7f0000000000)={0xc1, 0xfff, "d1bd31979b1a09f7cffb737362a7542f79a736d6a39c2b9cab0f6b3d96b1f4343387da4a2cec59819a62fe1f3942db5bec78a5cd9c2ea9cb7a7d7551fb0bed2eabeb2db879140102c7520b4da9e77c34003e0cb7a7e482496df8e81846d51f6034a0ccd9297b7dc990577fc99a60b6da549c52cd7bf8899e937edda6ee21dbf7d2ef17094ba02ea15910a93d0798ecf5e96a628755e4001aefcb2a41fa3088e2e94c2debd8c80a6ff035fc71d8b4f5f26fe179f3ba680a6aa5"}, 0x600002) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x76, &(0x7f00000002c0)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x40, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x6, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x0, 0xfe03, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3818, 0x1, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}, [@hopopts={0x18, 0x1, [], [@enc_lim={0xc001}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}]}}}}}}}, 0x0) 16:37:40 executing program 5: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180)=@gcm_128={{}, "463a92342d73f68f", "e8ca4c858b16eda5c8a30fb9e980c03c", "d565ab1b", "3bd5a4956999b1f6"}, 0x28) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2404a801) getsockname$packet(r4, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vcan0\x00'}) socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001980)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r8, 0x40186f40, 0x76002d) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0xfffffffffffffe7e, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef80514", @ANYRES32=0x0, @ANYBLOB], 0x4}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv6_getanyicast={0x14, 0x3e, 0x100, 0x70bd2c, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001bc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1a01821}, 0xc, &(0x7f0000001b80)={&(0x7f00000019c0)={0x1a0, 0x0, 0x400, 0x70bd2d}, 0x1a0}, 0x1, 0x0, 0x0, 0x40}, 0x50000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000004c0)="0a58ca3fbeb186e108ae30fc6a1db4806cb8d6197656af1334062599151319fc41ae10643547eb6d872fb4048bab35d6b50d6a052eb2dad40e2c252c7ad7f3f7758e0299f70ccd6a9c6c2e57dacd0b3cbb4ff9c919eeb8fdb39af9ef7a4c6d3059bbcbacad2d4b35394f90f567c0db3253655d792e23d43b74db31b37fcba7f5493286772f1ddbd1abc646de1eaece39cb36c7860a0c4936a018b9b8f5f126babff4d15bdf912078193bed8bba2cd7f7350ffa484c06434612c018f895f396a477309b95218907b21754758f52ef5911578ab49789ec380b27df76a85cfcf6bca1c89c064f", &(0x7f00000005c0)="9f8c9e664062ffec90992a0f239e05ecbd3dea24c67e652691deb6356902bc0424cd76463a534649ce94e6b88d78396a79bb968ec831df0f6f40bc7b2ca3cc4b47ad462bc524f37b1b7f12feed3aa5000bb91b75c8a595de35129440a89420a2b708ade22ab47b0ecfef0006fdf734e46cceb97bbc80526699253b8c23e2aec151a7906854f71a2e74f091cd9b382eb33d6a9f3a4034609b803be33625b0d80f08d9bdd7a18bbbc922493dd7975f563749905ceddc407bb6a2388e88bbcedceb23dd864383caec0504000117dbf0b74e1a9aa064fa0ddbb416fdbf8597cf3a73f48143e25457023538f7dee0", 0x4}, 0x20) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 181.037857] ubi0: attaching mtd0 [ 181.066683] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40400, 0x20) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/mnt\x00\x84<1\x03\x9c+]\xb1t\xf45\x9f\x1b\x85\x15\xde\xd8\xe0\x17\xd9\xae\x1d8\x88\xa1\x9c\x9bc\xde_\xddf\xdc\xf0z2\xf1\x9e\xef\xadsx]\x92N\x92$\x8b\xf7\xe0n\x1e\xd5[\xb2P\xbe\x0f[.\x97\xed\xf4\xc9A\xa2#8\x81\x9ff\xba\x8c;\x14\xc4\x84\xc0t\xcf\xbake\x14tr/f\xdb\xd4\x0fc#\xa1\xe0\x80\x12\x92\x98q\xa2\x8b\xact\x03N\xfd?I\xbc\x1f\x1c\xd9U\xd7\x19N\xb5j@\xff\xb7\xe8I\b\a\xaf;]\a') lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x4) syz_genetlink_get_family_id$tipc(0x0) pipe2$9p(&(0x7f0000000280), 0x8c000) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x28044801) setns(r1, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$netlink(r2, 0x10e, 0x9, &(0x7f0000000100)=""/4, &(0x7f0000000140)=0x4) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200081) setsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000000240)=0x7fffffff, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 16:37:40 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) syz_open_pts(r0, 0x4000000000005) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/user\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/543], 0x20) sendmmsg(r1, &(0x7f0000004380)=[{{&(0x7f0000000000)=@isdn={0x22, 0x1, 0x6, 0x1, 0x1f}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="7c3dec6b9c2ec25975177f71b94248920ea8a9a10fed88a537727f8b6fa1b1c4503c9ed30ffdc556d7585aa4defc9e75710a4e37b33a3ec4531352766944f894a3d7e5f39daa38d9d2271e827c4e6c551a359486557eb97e5250b82af2f2ed31fd869f0764c2020dd586f14870e74d4dcad4abe608ecb08343c021", 0x7b}, {&(0x7f00000001c0)="2f8ace6e32317d715dfd5e8ddf1510490b9be15ddce41c7a708b782a18043a49e1245bcbb07b7547a2110eabdf3553435273491bb225af64d1226cfad8ee699adb706aa71071a04145b183e97fef40f16a83ecff9b64a6e351ff3830d617cda7778bcc8f479d714084677702013515f2b4bc9982e197f77bedd51f505fded66e6b4c83cf2849af91f6a6fd6a9a5a17384f8b67643162f80c7c0ccab864f2763c9a1b0d445111364adf1a99d762c3345193d008a88e13920197649f8cfbf19b", 0xbf}, {&(0x7f00000000c0)}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000000280)="0966ff5980409ffcf1746f9755b2f69357e1119305d1267f5f703d2c4653b7bfb0a2d9cb8e92ef64b801790c5b06b277af1ccd3fe43e44c91675b63ec6bc8d0587fd08fee9392333486053953462ff2bd6ef7cbbf50ea32ddc1c3979eb7525c10b6b41a3e005ca897b6519ba8e0972d22a2889722030b44d377ae16ca62d09b0d9c904fafc88ee31c3fd206f76ac1e397960584510f7f9e9adea4b799bbd5323a654adde4c77ebe64460601e0bd4d6e6d2eeb5681af172b4bb757eeb8dda1ce4223b85e92624d292a994fa2018dbcb8d831a7ef5bb94f909e8d594ad090c5b6726c033add29e8aea897a60f90551c5cce587ed4dddaf2b", 0xf7}, {&(0x7f0000000380)}], 0x6, &(0x7f0000001680)=[{0x48, 0x111, 0x9, "ecda371bd531e059e6bdae70153965d0213885e1f15789534a29d79c175e7c927d39ef33872b55b8dd6f70110e20faa83fac8d"}, {0x100, 0x21a, 0x1000, "0d49dd1e62e74cbe8e1ddcb650bba5548adaeb47d56db73a07a615ea643beb01c365da4433ab08ac9af6061b02a6893c83bd2617fa7e2de6fc66b0f9cdb6fb440a26b0613b9850faa54fd23948a4eb24026cce1b4d5e3d8a9b501297d644dc83e866cb465a13d4c1f732ed8a7c16656a4828d7ad7072d75cfc963107f891c4e1a89954f6408808c7a9136a019107d8f92ec752bc989df05195dbcede881703fe7b2763e3b302270b447fd909ba2d61e3036897db00306768d60d490006c7a77dd6834b5aec3bdf9b467f2d9a7b6de8ed9766e7a45e4fc6738cb296aa7599573e13502a5566744640529a8d8eeff8"}, {0x78, 0x10b, 0x0, "59d49ea52eff462d1864c649f345756c39adac611219fa878edb894848d3de56258d775cf6efb797c9f97140facc000f1c183a1bbc8aba4a7200922198eb6ab94e73c195adf20a423efdc9811eacf5dd02c9a59538118011b9c164771dc99dd8f7ad4d"}, {0xa0, 0x105, 0x5d, "1479170c07a67972b8a021e0b7bc80d4df2d38d5ce8f46a0e1d062e266b7e244018486085237addffc5b8a05fb234a39e291ad0d668980389cf64e36c869b7d76ab2ed20ded58101b0e9c6a1ffa00725cd5ff25d2681a513a5436487a2afd71739578c7663f2797b62f2556fd834081f01d6cb6953bf4e0091819186ff802add4a8e0aa7513e6fa34013"}, {0x40, 0x80, 0x8, "79e349f163a4934decf79beb46217b555a6acd7149ac468f249614c76dbad1eb4606d4bea9b1ba28a1ba9c0595"}], 0x2a0}}, {{&(0x7f0000001940)=@caif=@dbg={0x25, 0xff, 0x2}, 0x80, &(0x7f0000001ac0)=[{&(0x7f00000019c0)="4e08f439a687bd7751c9da296081e2905631b7d0538cc1a54be5dde7c5df9bd8b8008d5a96dfc65e6a882cf5d4639d7717c0620e709dd770368791bb8f027043927b351d7a651463c52d6ed63354d8741983239ff679dde5e5c84168357fd50832f1e9220ceb41937444de3164e6560a75a43b08c56a8327a64173bbc485f623b204e916b50dfb1275c91dff4d7dd93ce7105cce1b11f714", 0x98}, {&(0x7f0000001a80)="d088936ef5b75a24fb474baf613dd0c81441cc", 0x13}], 0x2}}, {{&(0x7f0000001b00)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x5, 0x3f, "5de7b2893fa5c3b554cda835472843fcd74051bca498816ebfdc94f507363ed4339d3aa64e100aef14464e9c3f184a1905254047ff523d118e69c474471f91", 0x3b}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001b80)="05b0e2d6834a1b969c80061ab71e8b9326f2b5d2408e69e4df279a3cc0adb96c315a8d2fae895c80b097a37145a3a9f5aabefbfedded35af9cfdffce7e7be298c902ca7f5bc1206977978adac2cb0a0ecab8e78944abab8683090a314c3c8c7e2059c1e2a928910ac8e9d0b1bbba8bc7cc2c6f956aa40af66cc97ce655f656d51b0c20dcc8e1bfb181c8d95989b99ad8dbcb1cd5b3b6ae01426ef99b1f617622a8557a93343e7d909cb6d674dc2d60463abeb06bf257e409762cb85b562d134a0012a8a034a14b39", 0xc8}, {&(0x7f0000001c80)="dbeeab5a1e993aa2be5fca95c095d9a1a06f96a8fd48c6853e66b42ec1a5cf3ae83aa351f6ed7e87ed5a19cd3e7a6115197e8fef0dd3749974a2b86f435cef99dfc8a069d0445a0b4ca3f493c7dc2ca49d2f7f8c46651239bba7ff381a9f08c954d8c6425c1df3219f1fcb3348497be5b99b2c5cda8d430d03f21793", 0x7c}, {&(0x7f0000001d00)="4ec9a9a8dc647b5958fb362b14ad2a1de36fb8", 0x13}, {&(0x7f0000001d40)="aaa270e7169e428a4de173925d4110f01c98718145b8982ee1391f5742764a8d380fbfebcb881f700ad08ea9552b2aaaad9026a30067d8388e66ada29af2ee19aee3fe0dbed5c29a42d6e23e7a50c55d78b3ca1ece3c03e814c35d17e797f2e63c5d71b554080cf10588a28178567a90233df9b9fd02bc5c304176b1eebe34ee8d8ff1fde25b12e06ff716716984d774f7a35ecc6dbf897ce04241b65b60ff3a2657c0f60bc29059efb0eae33a6b69800f6003f65c5541afe820a4eead70d6b1f98757e38cf4b038605e9a647ac374947ca3e66c59e2a5862aaaf8dd9a27628275680d26c45f12339a87", 0xea}, {&(0x7f0000001e40)="60a0a4f91e9bd30f91e0366b554104ec5870e2145d30db4552c2b12e30379b8e433d", 0x22}, {&(0x7f0000001e80)="75b0757f8321b2e71e343f17ae424aaac7200aa13949c684ab65fbec6bf44b330d9dd80138bb6e0a9f0c2537c4f3ac770f816521d150d01841706da500b9d2966c42b86a5c45a34c072e7a06cfe6b63a9674476046ccd2e47519d2725fbe13", 0x5f}, {&(0x7f0000001f00)="5a5eff79bb826ff778cf2b969d441ac29abcb43e250a9a006a88970fb9aa64a4b3915c544f699235d3dfa77fca7237930beb502533b6b71de3bca63af9d7c2b24df0cc0785a80b41104db56a92b8003897a78e6d9e64fb939a078f70ec9b45b6ad22b4461101fe0afb22c1bc5b01e24c2187a34a5664923280eb1d5001fd55673f919e8d94afa10b02126d741993933e8b7fd43c25053509a45628b53c20a9d3d0d9199fddd3ce671a1a89a2c9161b1cafae9a232a7b3bf6fa8273cc356c49e7eb3ee983c5ac3e469158c6f937593700b46cbea6cfbdd348b5019b", 0xdb}, {&(0x7f0000002000)="7345ad7acf", 0x5}], 0x8, &(0x7f00000020c0)=[{0x108, 0x108, 0x4, "a92717df65708bf7eb7e28bbdb2ddf8e2806f13cb7901c0097cdd297be6479ce0a49492bc423a279d926c3e81b2a72f542a5d3ac34f259a246f3b7b7237a752b9e2b32a80c85993c1f33959006cf0fd364e991ce9fb4d6a2e2986a8c17bb59e1d290272a84978bddd9a88b71fe3a5403bfaf1516e952cff51d00de982811bf03243d2873688fd297b860b9ce4f0caa04848d971aee92802643a8c1f3602ad0ea8e3d7f92db766c937dd41c89ef93cd2fbc5ccaf3e27a7b08213c930336c881117afd7837482a8eae0645af8375fe5534c4cd2259d61e5d05e93442920e47fe71840b522061a732fdc018d32d479194a22afc10c1"}, {0x40, 0x103, 0xceae, "a54f163e56b46d0bd0f3f303641ca791454b1f7c1fce41954648c67d672955acb15738a4fc114ccbdb6f70bf"}], 0x148}}, {{&(0x7f0000002240)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000002840)=[{&(0x7f00000022c0)="74dc60f96f8dd6bbceeb326023135580f359", 0x12}, {&(0x7f0000002300)="6616dba6495eaaa0121494b58f8b46e675bad39d54ff1fa253c3217b1dc24d0cbaee9229c949158072eadeafc765824bb96e14528ecf5d46473652612b984cda3b5cd0373b45b4feaa38ba1f1a6a734050f6d8703649c0a3292cd72536d5542196223bce21585e8eea0aecf4bd824ab1587dc7237bfb82326aec4b090828fca4fca29f8b286054dac23bad07e68aaad29fe58c0534ac5d237414a71653ac12b8c766d1c82f311a6616c9db20d04651b193b10e09d0fa0c6a30c8f97e8426eda3a19d874622cc3c46a2f0eb03addf2d340467eaee02ebf8e9", 0xd8}, {&(0x7f0000002400)="49a503db24dd7e4205fae8320b529727e32bc47bf3c80bf62f7ae3e15d18699d6db75ae3da6a8280e3e5cb98d1af0b40ff1b15a437b7f53fe29886163abd12ab6288264aaa6044c41ce680c44245cd9c483e05dd787faf3137fd767e07d91431d2667f88fdc1e50d3f8436dce3e0845585f7bb9e1ce90fc0bac80ae469d44d1b5389a7822f9a32c9689861ce582e07057fb0a7d38f759ae1eae33741b15de028ecd255ab5c715ca2044bee63120501a4acc3d777084f01272d22434fe65ae87f55c8d9ead4a38a73c985c688d48f07927b33dc9ba686f6222e93221494e11eeb17b4d37d1a33a52b0c82084237f9dfce3f2e079bec", 0xf5}, {&(0x7f0000002500)="55687ca35aa3a7da204540ed743375ebf540224c9f1c8f2a0d1dd24b6db880a83e15bba9d3313647c4600c7d1362f40823d4caf91fb4ccd7a83eaa4de73e8629112931ea15f07d4cd64564db219fe14beb93efbeba37ce5f773ef79709469581d9", 0x61}, {&(0x7f0000002580)}, {&(0x7f00000025c0)="f4ed7e84531a7341758d1e409057faec890e325fef16d37db4f872e55af0386178af4e01930533c5b5091973abf77d6902aadecf8df8e96dcf1d68b703221b50822342feb48e7e07c4ab34f9b8b49c3c8ff05155a164ca85af30d4a935ab485863d04410b1b3651f386372d642f91f150799c03c1a3bcb7bfbaa13466ab101672cc85188fd32c8c2c54486f2b1fe9ece12a99afe85d697fac8a707053aad2344e9d7672aac988f98618ab6bd56659650afc0aaf0138d5abf7b1fa29e45c0b4c3a57eba2f8b12d38a49d7703021bf9d0c57170bb2be11c571fed9", 0xda}, {&(0x7f00000026c0)="2ae7ad4a5bcf2c4dee84c6cd4cdd66778d05dc80fab57398e08889cf4dd68cd950252c18047b1a1b7488899a7bc23848245751be", 0x34}, {&(0x7f0000002700)="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", 0xfa}, {&(0x7f0000002800)="35d7c687d4f530c8b0366b0b795b9e151e2c2f0eda112e8d46ba6a1f5275994198ebb6fd79e0c3648acbae1fa786484fa6f8a015d82d465e3b3c", 0x3a}], 0x9, &(0x7f0000002900)=[{0xd0, 0x107, 0x6, "8890f36fed2323e3a517457d3aea75b33c5e02b20afb7e52dc41555ef126e0fed03819c2a1c577a84d2d5d1fe96060772ff374184ebd8049e44761ce3a55233db24d4a0f03bae83b2928dc24b3957a9255e1a2347c404a6eb70d3a9faa257ce16ad4bdcb175f99139835bc6092981bd219385a10ffc2c756ae66b4b5d08f3213789c4850dc743cf310906058889ed4cf3a3ecfab8363d1f132bf0a715e64ec7e9985851c0d3b72f28e53a30f04a7de2670d3f320e7576ce4a0a6b64e2f43"}, {0x98, 0x111, 0x4, "cef46462d95b5e3e0839e0582ba886b2b620d1ea40d34c0f07aa27ee9407ffc0f410c539a5823fae0f42f0433b25830743041991809d62fc9435c8159f10124f6d1c249dddba4a1e3a4bc93b934474e2035712bc995f54e7a3ad5ea05acc94d89345578fb88a7a41989442d1cb9d3ed73d1120976be4d307c4bf23228158e64cd4b570dbbc"}, {0x88, 0x3a, 0x4, "81fc53485358f045ba537694a3c6450e586327e78d02f4fd4115d2854ae147fd776e2418eafb54bef6d386909a2746fd30e7efa8206a3e2417a6837de7e8957a23d180b678cb56498177b60673ba622a8cd630046667919dec922ff19c5cbc03639f3d33d70b9d5ea4a93ed897d1356c125b3b"}, {0x38, 0x1, 0x1, "8bab28f75e294a3a75e351171b02bda55b0932abbea2a99ddcf7c5ca90e80b401c"}], 0x228}}, {{&(0x7f0000002b40)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000003c40)=[{&(0x7f0000002bc0)="5cd6", 0x2}, {&(0x7f0000002c00)="0458f40b7f604c8444e2ab72d2", 0xd}, {&(0x7f0000002c40)="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", 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000003ec0)=[{&(0x7f0000003c80)}, {&(0x7f0000003cc0)="50c61025a9816ff1138ceb95c5447df9545e9035b9325b14565e458df477482601a1a9f221db2f16473965317bc13bf70ec853bec636b814c50f6c469287297650cae45610c6f37ed96e18c97d9f1c2bb72b3e59123f96cc1fb77491cd8b060e5627e2abc85491ebf5d877a9b4f4700d4b84df302addae83ba31777af49dc139929c2fa8cd09da06a5ec6e2b39597806fa13e00602865716bb3111b76a77006c37d68d0ff510034d37d62a7f80ced6b977d7c3dcb6e3fb4287faf7902a7db5b5bfcfbd33b92ba5d5e3e8140ab61b23c8006291917ef3e4308144d6a1cc016a1d1636fa500a670019e20eb4b3b0f95c78cdc5c24ef25a0b54f483c3", 0xfb}, {&(0x7f0000003dc0)="0b72117c4708b32a4da20197e7643b08660165afa91bcd015b2a9690", 0x1c}, {&(0x7f0000003e00)="f94d7eff9a6d72f077a6a5627b18e46e166e5b1bd72939bc2054e02c7231ab7d1ea85e1f5096d3674b8b7fffd60f9567dde65743b7b4ed8d0805470cf3b6ab997ce19524b2e4410ff19dc3bfa7005843e6c4abea3b5b5f6b017df4ce2d9221d856af2fdb6d74785687f19175a814d5932a09398905a81e7a52063e6867e4ecb86719166abcea33dbddd206b5c6ddb90e", 0x90}], 0x4, &(0x7f0000003f00)=[{0x70, 0x105, 0x9, "74e8a5c21611bd25d6bf76104b5e6a166d85c2cfeaff2960d926e4ac3681f4153d7d095fd3e0a36b7a6a379fe147e37397a40bcd5806e228ce75d2f54bc2967aee0d929d5a709d8acb2b4d639f6b8b0cc748bd9e150233008120c728d85e"}], 0x70}}, {{&(0x7f0000003f80)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f0000004100)=[{&(0x7f0000004000)="79bff03ced6e765b676a055a230bd58e12c16377da45c3d35f61962c5f4d1ee593cf12bd2460090769416e89b306d8361e54dc5d6ffdf919d4f7887bef177535f4b4e79e746b05f3210435f5d08c0cc54d942e7d3b9a17c52e345f0de3144dbdf72f2b3baf0e9cb7a1e1efa65cbca15a046d5cb8e46dd1e0ac8130618cd592d042a916fc7371aaf2bd2957ab4515d38bda7b69feb064bf74485a0729dc16d061959c56019c25940590e190612284087c9c5808a62fbfb3db6e634176d68166cdf384727df18eb69d79f52a021b0c398fdc6f37c385d6438298c0fa6edc6956d24761", 0xe2}], 0x1}}, {{&(0x7f0000004140)=@ethernet={0x306, @random="54d5d2f0333b"}, 0x80, &(0x7f0000004240)=[{&(0x7f00000041c0)="a3febab9812ab8e4286d732838c7362586268789530dc118740ffba3ed8859691b1eb5547f83a254d51056d1e699b857220f4c486bbf2f61dbd8c6e771030b9f51a5a9911a083e", 0x47}], 0x1, &(0x7f0000004280)=[{0xa8, 0x117, 0x401, "75d06126d8151a11676f3ae8a40b3ee7279d76ceea9d8f7b433760dfdc2c8b726d0d8e0393863b8e9b8db07757834214e511b85be9c0eab5ddd3622ccadd6d6ab68326eb26ed11346a9abe829b9109c0bec736dbd4ff2d598da1da7be07f8b45accf0a15ac888eb60aaea4b7238b2bbd9182447682f936fd1b43524ff9deef98d18addb74d5ac4956b6356af39c750bfd24d13cb0b"}, {0x30, 0x6060e5e08a6a7d47, 0x80000000, "20dc925ba7103dd2085fc1af727d35ab1618e882eef3d18421081a8c61ce"}], 0xd8}}], 0x8, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$packet(0xffffffffffffffff, 0x0, 0x0) msgget(0x2, 0x4) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) 16:37:40 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'erspan0\x00', r6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000100), 0xa}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f00000002c0)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB], 0x3}}, 0x0) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40449400}, 0xc, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[]}, 0x1, 0x0, 0x0, 0x8004}, 0x800) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mkdir(0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x5e) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) eventfd2(0x6, 0x1) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc001, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x0, 0x0, 0x10, 0x2}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44) keyctl$session_to_parent(0x12) io_setup(0x4, &(0x7f00000004c0)) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x8000, 0x0) ioctl$NBD_DO_IT(r4, 0xab03) r5 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) r6 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r6, 0x40046207, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) 16:37:40 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000580)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x80) epoll_create1(0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f00000006c0)={0x7, {{0xa, 0x4e20, 0x8001, @dev={0xfe, 0x80, [], 0x15}, 0x10001}}}, 0x88) getsockopt$inet6_buf(r4, 0x29, 0x23, &(0x7f0000000580)=""/219, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0xff3b) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDDLCI(r6, 0x8980, &(0x7f0000000580)={'nr\x0fjc\x00\xff\x03\x00\x00\x00 \x00', 0x10001}) sendmsg$NET_DM_CMD_START(r6, &(0x7f00000007c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x14, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20040801) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x10, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x14000180}, 0x48001) socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 181.687770] binder: BINDER_SET_CONTEXT_MGR already set [ 181.693223] binder: 7599:7619 ioctl 40046207 0 returned -16 [ 181.715315] audit: type=1400 audit(1571330260.895:68): avc: denied { set_context_mgr } for pid=7599 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 182.313144] binder: BINDER_SET_CONTEXT_MGR already set [ 182.318476] binder: 7599:7619 ioctl 40046207 0 returned -16 16:37:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffffffffffff7cfe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pipe(0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) fallocate(0xffffffffffffffff, 0x40, 0x0, 0x7) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) getsockname(r1, &(0x7f0000000180)=@l2, &(0x7f0000000000)=0x80) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00107065726469723d2e2f6669e51655498e41d51f35d51a6c65302c6c6f7765726469723d2e3a66696c65302c776f726b"]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000140)='./file0/f.le.\x00') 16:37:41 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r6, 0x28007d) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYRESHEX, @ANYBLOB="2cc395ea559561f86491c20600e300"]) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYRESDEC=0x0]) sendfile(r6, r6, 0x0, 0x2008000fffffffe) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x7) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x2da) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x50000}, 0x1c) 16:37:41 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:37:41 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'erspan0\x00', r6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000100), 0xa}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r7, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f00000002c0)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB], 0x3}}, 0x0) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40449400}, 0xc, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[]}, 0x1, 0x0, 0x0, 0x8004}, 0x800) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) mkdir(0x0, 0x0) chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x5e) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f0000000280)={0xcf, "b859392e6b72c43985ae47c2f65b69046055ad3300ebaab58d22b843734577c37810423a7b7d252f0a401b76a2b420a208b6a239856a3eb69314c43e95ebf25a016e25e8172cc3f8d7cdd124bb0346811b31ae7e4a100f9ace3e0d23b7b86404a1c8cf1892fbae0fd38224c0940e1f7295367645f8cd74115065c314c9b88e148bc0728a2c8d4c0d7fdd78eefa320c7d74518b1b0acc3d296ad73b6966521aba92418f88ce54e7369a3c5ab3e169db0c4e78f8b4f40b51b8c9808e9d3748f362f3a52356db86647b64b06868abaddd"}) 16:37:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = dup(r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8c0900, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r4 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x3, 0x0) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000140)=0x1) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) setsockopt$inet6_int(r5, 0x29, 0xeee28289f0ac7cd9, &(0x7f0000000000)=0x5, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) [ 182.979715] overlayfs: missing 'lowerdir' 16:37:42 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) r5 = creat(0x0, 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, 0x0, 0x0, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab", 0x5a, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, 0x0) r7 = creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000027000)={0x1}) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r9, r7) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={0x0, 0x9}, 0x8) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r14, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) socket$inet(0x10, 0x0, 0x0) [ 183.061998] overlayfs: missing 'lowerdir' 16:37:42 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc5291793ea975cc22ca7c07ced93b665d9e45871f7687d63f44d4d868a2be1e07a4bbe73665b0a0fe52f521c2b62"], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000140)=0x5) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl(r1, 0x2, &(0x7f0000000240)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000380)={0x1}, &(0x7f0000000280)=0x1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x50, "6a22894b5ee28d74626f03e9ba0eca3b07e335f72b9239c988b7a291c68037f6468258dc456e2a06917c6919d6436ee598864904569bf75a7e0fe037f406fe43b65128fc248ba4a7f2c629f53d97e13e"}, &(0x7f0000000340)=0x58) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000001c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) 16:37:42 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40800) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = epoll_create1(0x80000) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f00000005c0)="0d8bfa92edbac27882cbfbc9e0b14e1dd52661989860be17e0c8c060ddf37f0fc790057c6f1e0f549d369b79ca767fe006ddab3e134fb6982f6112fbf77422355041ad13232d476c5ba8a247b154162d243501be75a0a2dbaf2e56d99a2a9309210a2bda5d45a8dde9cb27cdba0500000025976d70464407b845093c45563bb42d53cfddc31ddec056bb0742ecd63c8f804445307928fb24a06af8337f2b288544779e678c290eabe1caaabae2210000000000000000000000000000006fcad1c4", 0xc1}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x185, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0xb) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x0, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r6, 0x11, 0x0, &(0x7f0000000000), 0x4) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(0xffffffffffffffff, r7, 0x0, 0x80000005) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100), 0x10) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r8, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r9, 0x1, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x26, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x200000000, 0xefe, 0x0, 0xd480f287c8a627fc, 0x0, 0x20000}, r10, 0x0, 0xffffffffffffffff, 0x6) [ 183.337629] ubi0: attaching mtd0 [ 183.396198] audit: type=1804 audit(1571330262.595:69): pid=7677 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir183083562/syzkaller.0SoPEJ/27/file0" dev="sda1" ino=16602 res=1 [ 183.458468] ubi0 error: ubi_attach_mtd_dev: bad VID header (33554432) or data offsets (33554496) [ 183.477845] ubi0: attaching mtd0 [ 183.481670] ubi0 error: ubi_attach_mtd_dev: bad VID header (33554432) or data offsets (33554496) 16:37:42 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x84000) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x98428d57a99b5f44) io_submit(0x0, 0x0, &(0x7f0000000540)) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, &(0x7f00000001c0)=@ccm_128={{0x185}, "811a8555065b2075", "2ac14bcb79c5361f3737591ec0ed0767", "54876058", "91de20cb45273e63"}, 0x28) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @empty}, 0x1c) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x4e22, @remote}}}, 0x88) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) [ 183.489232] audit: type=1804 audit(1571330262.685:70): pid=7683 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir183083562/syzkaller.0SoPEJ/27/file0" dev="sda1" ino=16602 res=1 16:37:42 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8011a484e65b37e866369e0751b310c2e4c24e0ef4ea10fc5291793ea975cc22ca7c07ced93b665d9e45871f7687d63f44d4d868a2be1e07a4bbe73665b0a0fe52f521c2b62"], 0xfc7c) fallocate(r0, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000140)=0x5) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl(r1, 0x2, &(0x7f0000000240)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000380)={0x1}, &(0x7f0000000280)=0x1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0x50, "6a22894b5ee28d74626f03e9ba0eca3b07e335f72b9239c988b7a291c68037f6468258dc456e2a06917c6919d6436ee598864904569bf75a7e0fe037f406fe43b65128fc248ba4a7f2c629f53d97e13e"}, &(0x7f0000000340)=0x58) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000001c0)) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) 16:37:42 executing program 0: delete_module(&(0x7f0000000240)='\x00', 0x800) r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x100, 0x5, 0x1}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = syz_open_dev$cec(0x0, 0x2, 0x2) r6 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_load(r5, &(0x7f0000000240)=ANY=[], 0xfffffffffffffe99) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r1, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffefffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="85000000090000006c0000000004000095000000000000005052b092b9e7e2212d6502184ac76b5b99d78dc9e26f33bf52d96dc5ecf0e24b4b2319a34e881f02b5a80e3627eab2f2ae3eeb07a06883abdda151d240d080fa557dafd292c16d5976270b1acbc010795a9ff476ff1e6b414e2b325441324a368c1868c5cb011f2cf684de0f"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207, 0x0, 0x0, [], 0x0, 0x0, r6, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x70) r7 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r7, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r9, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r10 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r10, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) write$binfmt_misc(r11, &(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[], @ANYRESDEC, @ANYPTR64, @ANYRESOCT=r0], 0x36c) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r12 = creat(&(0x7f0000000300)='./bus\x00', 0x5b4e55ada0ff7139) r13 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r13, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r13, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r13, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r12, 0x4, 0x98428d57a99b5f44) [ 183.637112] ubi0: attaching mtd0 [ 183.644640] ubi0 error: ubi_attach_mtd_dev: bad VID header (33554432) or data offsets (33554496) [ 183.710757] audit: type=1804 audit(1571330262.905:71): pid=7699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir183083562/syzkaller.0SoPEJ/28/file0" dev="sda1" ino=16602 res=1 16:37:43 executing program 0: socket$netlink(0x10, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) unshare(0x40400) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000700)={'bond0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0xffb}) prctl$PR_SET_DUMPABLE(0x4, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e24, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x9, @loopback}}, 0x0, 0x2}, &(0x7f0000000040)=0x90) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x6, 0x0, &(0x7f0000000240)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x280000, 0x22, 0xd9, 0x2, 0x18}, 0x98) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(r1, 0x1f00000000000000, 0x0, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f00000002c0)={0x0, 0x0, 0x18b, [], &(0x7f0000000280)}) prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/4) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 16:37:43 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4ca32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x11) 16:37:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f00000002c0)=0x7) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000008b0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef67000000000010000000ebffffff00000000000000000000000000000000000000000000000000000000000000000005000000"], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newtfilter={0x3c, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {}, {}, {0x3}}, [@filter_kind_options=@f_basic={{0xc, 0x1, 'basic\x00'}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x0, 0x5}}]}}]}, 0x3c}}, 0x0) [ 184.032012] audit: type=1400 audit(1571330263.235:72): avc: denied { map } for pid=7713 comm="syz-executor.1" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=28815 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 184.064029] ubi0: attaching mtd0 16:37:43 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f00000000c0)=""/129, &(0x7f0000000000)=0x81) syz_read_part_table(0x0, 0xaaaaaaaaaaaa9f4, &(0x7f0000000200)=[{&(0x7f0000000080)="020005000000010000140000000000000000050000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 16:37:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) mmap(&(0x7f00004c4000/0x1000)=nil, 0x1000, 0x300000b, 0x50, r0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffd9) [ 184.078597] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 184.149568] audit: type=1400 audit(1571330263.325:73): avc: denied { ioctl } for pid=7710 comm="syz-executor.0" path="socket:[28827]" dev="sockfs" ino=28827 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 184.248279] bond0: Releasing backup interface bond_slave_1 [ 184.271637] ldm_validate_privheads(): Disk read failed. [ 184.280763] loop2: p2 < > [ 184.290112] loop2: partition table partially beyond EOD, truncated [ 184.326449] audit: type=1400 audit(1571330263.415:74): avc: denied { map } for pid=7725 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=16 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 16:37:43 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1800, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000480)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x53, "8b0d0e", "a0cef4e95e63dec275a3c88db71cf276cbdc6d83ea32e2bead09198762ab96c81a3220c4993d855d3fcdf7f1d8ba11ab05649dd0d86fda7428cf17a6a758b0221b7e9de570da1ebf733e278a9a6b75f8ea35578ca2987147d1483b3ef9cd62d19b855dcd88bc5c07fda9c2dcddc25bd7b46dc597dda9609b9643cabc1d726f13959c11585ba7ebc0181f93a397dd02ef1ce97ff7d6e48491d6bded0db8eff89dd9702994d9657f14563fcfa6c98631786db753a4ba20693a64c09d7747748f598e7594084da0bea516f3069b645befd5c082497a764c06a768eb357aa247b93700bd1bc271b7de749fd7c88b0f95b457488042feaa4372951f6860663ff02aa9"}}, 0x110) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000001c0)={0x1, 0x0, 0x3f, 0x3, 0x9}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x78, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}]}, 0x78}}, 0x0) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000c46f000600000030e005a21e0d446f07f97b000000c27ed0e81f0002000000001d000067681bfd070000000100000000fb6c7a2ce29ad2db9bbf9d56f4145d14b7afb9192c7b9b50bc00eb1dbd3d9b4b8d94e5cf96c366c8ba5d9506b52bd8a8152f1ae06f123399b5390a3d6cefbdc7ad2aa905d52c4ad8232e21c80d1669760fae6f28819489436a5ea9157463c0f8eb906f753d0603faa09e8dea38fd51e5c5d1d8f253c08c6d5f4686d4f83a6ea202b8583760d4297c2b82ad34c3ca813beb76a7765ecd5900"/235], 0x305) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$PPPIOCGFLAGS1(r6, 0x8004745a, &(0x7f0000000180)) [ 184.366979] loop2: p2 size 2 extends beyond EOD, truncated 16:37:43 executing program 3: r0 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8}, 0x3c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xde6, 0x410000) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000000c0)={0x1f, 0x9bac, 0x7ff, 0x3}) bpf$MAP_CREATE(0x0, &(0x7f00000099c0)={0x0, 0x0, 0x0, 0xdf4a, 0x42, 0xffffffffffffffff, 0x6}, 0x3c) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) close(r1) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) setsockopt$sock_timeval(r4, 0x1, 0x43, &(0x7f0000000280)={0x77359400}, 0x10) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x2, 0x2, 0x5, 0x0, 0x2, 0x100, 0x11, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x123bac18d3ab397b, @perf_config_ext={0xffff, 0x1}, 0x2, 0x1000, 0x1, 0x9, 0x7, 0x3f, 0xff2}, 0x0, 0xe, r3, 0x1) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) 16:37:43 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000140)=0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000180)) creat(0x0, 0x0) epoll_create1(0x1c0000) socket$alg(0x26, 0x5, 0x0) socket(0x10, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 184.556796] SELinux: policydb table sizes (6,-1576673232) do not match mine (6,7) [ 184.604367] SELinux: failed to load policy 16:37:43 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) utimensat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={{}, {r2, r3/1000+10000}}, 0x0) sendto$rose(r1, &(0x7f0000000240)="6c58722bcacc39a0b928f14d18ed8d0a99f2fb89b9f6890a101b2361b09e46c680cab0775b50d3be90dcd4e6dbc1455f5e19bc2dce9142", 0x37, 0x80, 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000100)) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@type={'type', 0x3d, "4fcd0454"}}], [{@uid_lt={'uid<', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x39, 0x31, 0x996dcc9a4d58a0c6, 0x30, 0x30, 0x63, 0x35], 0x2d, [0x63, 0x35, 0x64, 0x61], 0x2d, [0x64, 0x66, 0x37], 0x2d, [0x64, 0x34, 0x31, 0x66], 0x2d, [0x63, 0x30, 0x66, 0x33, 0x36, 0x37, 0x0, 0x33]}}}, {@obj_user={'obj_user', 0x3d, 'hfsplus\x00'}}, {@dont_hash='dont_hash'}, {@uid_lt={'uid<', r4}}, {@subj_role={'subj_role', 0x3d, 'force'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsroot={'smackfsroot'}}, {@euid_eq={'euid', 0x3d, r4}}]}) 16:37:43 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x160) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x600000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = fanotify_init(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x388, 0xfffffffffffffffe) syz_open_procfs(r5, &(0x7f0000000040)='stat\x00') setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) fanotify_mark(r4, 0x2000000000000011, 0x2, r3, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffa7) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, 0x0) 16:37:44 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000140)=0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000180)) creat(0x0, 0x0) epoll_create1(0x1c0000) socket$alg(0x26, 0x5, 0x0) socket(0x10, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 16:37:44 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8100, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x6) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4100, 0x0) pipe(0x0) pipe(0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000280)=""/136, 0x88}, {0x0}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)=""/153, 0x99}], 0x4}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000340)={0x60, 0x0, 0x6, {{0x8, 0xd8d3, 0x2, 0x0, 0xfff, 0xfffffff8, 0xffffffff}}}, 0x60) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) close(0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_sctp(0x2, 0x0, 0x84) 16:37:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(0x0, 0x0, 0x0) linkat(r0, &(0x7f00000016c0)='./file0\x00', r0, &(0x7f0000003ec0)='./file0\x00', 0x800) write$9p(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, 0xffffffffffffffff) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000008c0)=ANY=[@ANYPTR], 0x1}], 0x1, &(0x7f0000000a80)=ANY=[@ANYBLOB="140000000000000001000000014600c4f48a626f5280df866b32b5f98444f456d3132263846f2fd10370085ce9afd3924d2460aabbfc0485cf98574afcd4392f97f26f13d6a804589269649a2df08698866eb3862d7b280970677e4604c230d54046e462223ab1a473a6683ba3bfeb349389bcdbed9fdeb57aecfc4ff9ede4e506f998e5026344f916823402e945a50fbabe8d5dd5494597dd303bccf9bf331a5b633748bec7a2e8710a9281d0140debca6954ca79e50642d14071cfaf75ecf4c014bf9451c19b4c84", @ANYRES32], 0x14, 0x20000000}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004840)=[{{&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002700)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/138, 0x8a}, {&(0x7f00000005c0)=""/87, 0x57}, {&(0x7f0000004a40)=""/4109, 0x100d}, {0x0}, {&(0x7f0000004980)=""/59, 0x3b}, {&(0x7f0000001700)=""/4096, 0x1000}], 0x7, &(0x7f0000002780)=""/162, 0xa2}, 0x3f}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000002840)=""/160, 0xa0}, {&(0x7f0000002900)=""/4096, 0x1000}, {0x0}, {&(0x7f00000039c0)=""/97, 0x61}, {&(0x7f0000003a40)=""/220, 0xdc}, {&(0x7f0000003b40)=""/147, 0x93}, {&(0x7f0000003c00)=""/131, 0x83}], 0x7}, 0x8}, {{&(0x7f0000003d40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000000980)=""/201, 0xc9}, {&(0x7f0000000240)=""/93, 0x5d}], 0x2, &(0x7f0000003f80)=""/216, 0xd8}, 0xff7}, {{&(0x7f0000004080)=@can, 0x80, 0x0, 0x0, &(0x7f0000004280)=""/134, 0x86}}, {{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000004340)=""/148, 0x94}, {&(0x7f0000004400)=""/196, 0xc4}, {&(0x7f0000004500)=""/115, 0x73}, {&(0x7f0000004580)=""/83, 0x53}, {&(0x7f0000004680)=""/102, 0x66}], 0x5, &(0x7f0000000640)=""/141, 0x8d}}], 0x5, 0x40, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x2000000, 0x13, r1, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000b80)=0x0) r9 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') preadv(r9, &(0x7f00000017c0), 0x199, 0x0) sendmsg$key(r9, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000800)={0x2, 0x13, 0x5, 0x6, 0x14, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d5}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @multicast1}}, @sadb_key={0xb, 0x9, 0x258, 0x0, "ac7c2e3bc21058a62891b29d087c8f1189c8379878f88d5f97588ad17d7684a30cb86384625eba07c8c66029faabb5a386ccc7dc779e3c2ad2e196a47151066997ffbd68f68742a4e58d59"}]}, 0xa0}}, 0x20004000) perf_event_open(0x0, r8, 0x3, 0xffffffffffffffff, 0x3) socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r10, @ANYBLOB="00000000000000000225040000000800020003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x11) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f00000001c0)={@dev, @empty, @broadcast}, 0xc) [ 184.866194] audit: type=1800 audit(1571330264.065:75): pid=7777 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16619 res=0 [ 184.891791] hfsplus: unable to parse mount options [ 184.971440] hfsplus: unable to parse mount options [ 185.009556] audit: type=1804 audit(1571330264.065:76): pid=7777 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/34/file0" dev="sda1" ino=16619 res=1 16:37:44 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000170200464007002e"], 0xc) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000100)) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000200)=ANY=[], 0x5aa78d33) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x480a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x8, 0x475ee707}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x10, 0x0, 0x10fffe) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f000000fffa)='./bus\x00', 0x141046, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$VFIO_IOMMU_MAP_DMA(r2, 0x3b71, &(0x7f0000000140)={0x20, 0x7ccbf472ef054ce8, 0x1c000, 0x4, 0x80}) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() 16:37:44 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000140)=0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x62a, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x10, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000180)) creat(0x0, 0x0) epoll_create1(0x1c0000) socket$alg(0x26, 0x5, 0x0) socket(0x10, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r6, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 185.301849] audit: type=1804 audit(1571330264.065:77): pid=7777 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/34/file0" dev="sda1" ino=16619 res=1 [ 185.304626] overlayfs: failed to resolve './file1': -2 16:37:44 executing program 5: ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000000c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x16) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xf17) unshare(0x40040400) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="e54e000000000000000008000000180004001427a1f8dc726f6164634273742d6c696e6b00e1c44d739b131405a1f1694a9952bd107924b82ec0bc2c6e"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)={0x15c, r4, 0x400, 0x70bd2d, 0x0, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @mcast2, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @remote, 0x72}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x971}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}}, {0x14, 0x2, @in={0x2, 0x0, @rand_addr=0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x46bf}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6c}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x444}, 0x80) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000180)=0x804, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0xc) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0xa00000, 0x0, 0x9, [], 0x0}) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000000)) waitid(0x0, 0x0, &(0x7f0000001ff0), 0x5, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') 16:37:44 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x84000) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x80, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r7, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r6, &(0x7f0000000000), 0x377140be6b5ef4c7}]) sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\r\x00', @ANYRES16, @ANYBLOB="210e25bd7000fedbdf250d000000340007000c00030008000000000000000c000400fbffffffffffffff080001000d35785c080001007500000008000100010000002400090008000100090000000800010003000000080001000400000008000200060000001c00020008000100f72e000004000400080002000000000004000400340006000400020004000200080001000b050000080001003b96000008000100129400000400020008000100060000000400020018000400147fffffffffffffff000000080001000b000000"], 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) [ 185.608479] audit: type=1400 audit(1571330264.205:78): avc: denied { map } for pid=7784 comm="syz-executor.2" path="socket:[28927]" dev="sockfs" ino=28927 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1 [ 185.745478] IPVS: ftp: loaded support on port[0] = 21 16:37:45 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x1ff, 0x4, 0x3005, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000043f6a9e358eaa828cba05c14bb89774b4e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d5", 0x0, 0x100}, 0x28) 16:37:45 executing program 2: timer_settime(0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000480)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TUNSETLINK(r0, 0x400454cd, 0x13) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0xffffffff, 0x81, 0x9e, 0x800, 0x18, 0xaf, 0x1, 0x2, 0x9, 0x140000, 0x4, 0x3ff}) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 16:37:45 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x84000) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x80, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r7, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r6, &(0x7f0000000000), 0x377140be6b5ef4c7}]) sendmsg$TIPC_NL_NODE_GET(r6, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\r\x00', @ANYRES16, @ANYBLOB="210e25bd7000fedbdf250d000000340007000c00030008000000000000000c000400fbffffffffffffff080001000d35785c080001007500000008000100010000002400090008000100090000000800010003000000080001000400000008000200060000001c00020008000100f72e000004000400080002000000000004000400340006000400020004000200080001000b050000080001003b96000008000100129400000400020008000100060000000400020018000400147fffffffffffffff000000080001000b000000"], 0xd4}, 0x1, 0x0, 0x0, 0x8084000}, 0x1000) 16:37:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = accept4$inet(r1, 0x0, &(0x7f0000000000), 0x800) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@attr2='attr2'}]}) 16:37:45 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/255, 0xff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x2f) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r0, r1, 0x0, 0x3, &(0x7f0000000100)='}}\x00'}, 0x30) prlimit64(r2, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x401, 0x0, 0xfffffffffffffffd}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create1(0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) [ 186.269341] devpts: called with bogus options 16:37:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8080) getsockopt$sock_timeval(r1, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) recvfrom$llc(r3, &(0x7f0000000140)=""/158, 0x9e, 0x2, &(0x7f0000000080)={0x1a, 0x204, 0x7f, 0x1, 0x1, 0x7, @broadcast}, 0x10) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000200)={0x1, 0x9, 0x906, 0x1f}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 16:37:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="f30f090f35642ef22e650f093e67650fc728b9f90200000f320f01eec4c2359994e1003000000f0171009a0f0000001c0066baa10066ed", 0x37}], 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) sendmsg$nl_generic(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42900000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"/292], 0x124}, 0x1, 0x0, 0x0, 0x2c004}, 0x20000) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:37:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)=0x3) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x40040001) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) 16:37:46 executing program 3: mknod(&(0x7f0000000140)='./bus\x00', 0x8, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:crack_exec_t:s0\x00', 0x22, 0x0) execve(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x2, 0x100) open$dir(&(0x7f0000000080)='./file0\x00', 0x101000, 0x100) 16:37:46 executing program 0: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x80e, 0x4000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(0xffffffffffffffff, 0xc008551a, &(0x7f0000000000)=ANY=[@ANYBLOB="01040000480000005affe600e1ffa991dfcc776b8c5c8ef7ff00000000ff010000000001000100000009000000060000208d000000"]) 16:37:46 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000008, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x1, 0x3) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x0, &(0x7f0000000000)) [ 187.031900] IPVS: stopping backup sync thread 7017 ... [ 187.053601] device bridge_slave_1 left promiscuous mode [ 187.079452] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.100254] devpts: called with bogus options [ 187.129908] device bridge_slave_0 left promiscuous mode [ 187.159205] bridge0: port 1(bridge_slave_0) entered disabled state 16:37:46 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x84000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000240)={{0x1, 0x0, @identifier="4b817eeaa422cc2c1c2cda51e5b85665"}}) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000001c0)=0x8a7) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000180)="95d7dad8a62f83fc8ff68a74ec3a10ab3153f2d5d794b87275011c1fc952827d4c004bd7858dac67eb") syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x10, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) r3 = socket(0xa, 0x1, 0x0) close(r3) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)={r5, 0x400, 0x5, [0xffff, 0x1, 0x9, 0x2, 0x3]}, 0x12) pipe(0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 187.345430] device hsr_slave_1 left promiscuous mode [ 187.372641] EXT4-fs (loop0): Unrecognized mount option "" or missing value [ 187.385322] EXT4-fs (loop0): failed to parse options in superblock:  [ 187.406302] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 187.447387] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 187.479237] device hsr_slave_0 left promiscuous mode [ 187.479975] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 16:37:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x800, 0x4) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 16:37:46 executing program 1: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x40) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000080)=0xcf27) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) connect$bt_rfcomm(r3, &(0x7f0000000180)={0x1f, {0x5, 0xce, 0x2, 0x4, 0x1, 0x2}, 0x20}, 0xa) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000140)={r5, &(0x7f00000000c0)=""/116}) ioctl$DRM_IOCTL_UNLOCK(r4, 0x4008642b, &(0x7f0000000100)={r5, 0x1}) socket(0x0, 0x0, 0x0) [ 187.502688] team0 (unregistering): Port device team_slave_1 removed [ 187.523622] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 187.564370] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a002c01c, mo2=0002] [ 187.578135] System zones: 0-7 [ 187.582127] team0 (unregistering): Port device team_slave_0 removed [ 187.603243] ldm_validate_privheads(): Disk read failed. [ 187.616004] loop5: p1 < > p3 [ 187.619372] EXT4-fs (loop0): orphan cleanup on readonly fs [ 187.634329] loop5: partition table partially beyond EOD, truncated [ 187.635759] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 187.651189] EXT4-fs error (device loop0): ext4_orphan_get:1261: comm syz-executor.0: bad orphan inode 235 [ 187.675696] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 187.693235] loop5: p1 size 2 extends beyond EOD, truncated [ 187.703559] EXT4-fs (loop0): mounted filesystem without journal. Opts: ; ,errors=continue [ 187.704740] ubi0: attaching mtd0 [ 187.734185] loop5: p3 size 32769 extends beyond EOD, truncated [ 187.747245] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) 16:37:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sync_file_range(r0, 0x6300, 0x3, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x9) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001140)="8be571ccc6deb179", 0x8}], 0x1, &(0x7f0000000340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0xac2b336}], 0x1}}], 0x3ffffff00000002, 0x0, 0x0) [ 187.811464] ubi0: attaching mtd0 [ 187.814948] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) [ 187.886639] ldm_validate_privheads(): Disk read failed. [ 187.911499] loop5: p1 < > p3 [ 187.929648] loop5: partition table partially beyond EOD, truncated [ 187.977871] loop5: p1 size 2 extends beyond EOD, truncated [ 188.032217] loop5: p3 size 32769 extends beyond EOD, truncated [ 188.098245] ubi0: attaching mtd0 [ 188.105506] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) [ 188.115509] bond0 (unregistering): Released all slaves [ 188.142476] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 188.173124] print_req_error: 49 callbacks suppressed [ 188.173129] print_req_error: I/O error, dev loop5, sector 0 [ 188.184403] print_req_error: I/O error, dev loop5, sector 0 [ 188.190723] print_req_error: I/O error, dev loop5, sector 0 [ 188.196628] buffer_io_error: 50 callbacks suppressed [ 188.196633] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 188.209930] print_req_error: I/O error, dev loop5, sector 0 [ 188.215716] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 188.227578] print_req_error: I/O error, dev loop5, sector 0 [ 188.233509] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 188.241018] print_req_error: I/O error, dev loop5, sector 0 [ 188.246785] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 188.254713] print_req_error: I/O error, dev loop5, sector 0 [ 188.260469] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 188.267941] print_req_error: I/O error, dev loop5, sector 0 [ 188.274270] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 188.281745] print_req_error: I/O error, dev loop5, sector 0 [ 188.287449] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 188.294853] print_req_error: I/O error, dev loop5, sector 0 [ 188.300594] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 188.307921] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 188.315368] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 190.566565] IPVS: ftp: loaded support on port[0] = 21 [ 190.637006] chnl_net:caif_netlink_parms(): no params data found [ 190.667481] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.673998] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.681023] device bridge_slave_0 entered promiscuous mode [ 190.687545] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.694198] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.701085] device bridge_slave_1 entered promiscuous mode [ 190.717343] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 190.726267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 190.742949] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 190.750115] team0: Port device team_slave_0 added [ 190.755438] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 190.762567] team0: Port device team_slave_1 added [ 190.767666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 190.774945] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 190.792586] device hsr_slave_0 entered promiscuous mode [ 190.798178] device hsr_slave_1 entered promiscuous mode [ 190.804293] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 190.811272] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 190.823604] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.829951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.836591] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.842939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.868853] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 190.875821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.883885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 190.893104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.899983] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.906896] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.915827] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 190.921974] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.929884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.937996] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.944447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.961799] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.969349] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.975717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.983326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.991017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.998455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.006370] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.015000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.024852] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 191.031265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.045083] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 191.054517] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.108330] ubi0: attaching mtd0 [ 191.112512] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 191.138891] XFS (loop2): Invalid superblock magic number 16:37:50 executing program 2: ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000600)='bpf\x00\xe4\x9b\x01z\x0e\x02\x1a\xf9\xb3X\x0f\x96\xe7\xdf\x0f&8\xd0\xba\xc1\x03B5t\xab\x1c\x94b\x8e\xfe\xb2b\xfcp2af\xb6\xc3vj^#\xff\xda<\xa4\xe9\x80\xb3\xc4\x1b\xf8\v\xf68\x0e\xba\x14q\xa4\xdb\xe6\xf3\x04\xc8m\x12\x82\xdeT\x9fe\xfc\xb2FY\xc7Z\xafJ\x13.-\x84EN\x97\x06E\btP\xd3\x9fag\x9c\x1e\x00\xa9C\xb7\xa47\x9f9\xc9\xa3\xc8\x83\x85*\x18\xd2\x0f\x04\x17r\x0e\xbc}\xefB:\xe2\x05\xb6T\x94\xa8\x87\x1c\n3tN\xe9\xbcP]\xc1\xa3,1\xc6\x0f\xfb2\xdcG\xdf8_A\xacvH|\xe8\f0\xdd_\xe8\b\x00%v>\x12.\xd2\xd5J\xa0\xcd\xc1\xf0\x8b\xaa\xd0\x83)\xd3\xa7\x8a^S\xed\xa1\x83\xa5H\xf3\xba\x17C!\xc7GX\xa8\xc7u\r\x15ub\xfc\fU\x005^v\x8c\x1a\xcb\vi\x99\xe4el\xc4\xa7\xb8\x7f\x02\xd5\xe3$\xe3\x9d\x002\x96\x91\v.*\xa5I\xb0', 0x1) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) lseek(r1, 0x0, 0x1) sendfile(r2, r2, &(0x7f0000000440), 0x20) sendfile(r2, r2, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') getdents64(0xffffffffffffffff, &(0x7f0000000200)=""/191, 0xbf) write$UHID_CREATE2(r5, &(0x7f0000000700)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000002b00000000000000000000000000000000000019000008394c6d59262cb61ff916829f820000000000000000004000000000dcea1523674e4fc200000000000000000000000000000000049dec26a8eb0cf100000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000073797a31000000000000000000362ad839b57fbece00000000000000000000000000000000000000000000bff0e7c972e359a773bca600de00000000000000000000000000000032118300acc200b01dc63dfe97d900010400000081615271deb18703a318d441d8ef0ba51947190a0bb05049ddb68644e3b64f21174d5afe551699d9c26de9edec7b4bae4b4fda8eaef1ce8d81da25fb9ca96d5e3fd0f47e906cf9778553a9341e9ee2a88f216bba214c5aea3b72f6987110c79b8a15cffdc36009808c7c4ee3aa990dd262a2ded1c909097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb8100000000000000000000063887e2662ce8a60f81e1bc1dff064ecd04df4f063773e1f878fd338a2b55fd49181ff33e79f42b664daa08ecb7b44dbb897ba998b987878064f146150ca6722b66990c998f847fbc7a8338f00c9268443f41784373c9690b53f641f2d6b5b2b249d2f0fbb91c1d3be4f2a0578bea66011fe78a22b8ce7e4a48426856e8439c76f51defd9bb8fd889ff682634327c7d650e44d8ec18213cb4f7a4892c12fac30f156d61618a969bd4a93fc75ee1140fa6b254d152c11a7e29b3edb36968336b3fb97c0f8ef9bee93cd1128df494b24550da2bf1bd25d2d8d5ddf6c476e6644f2a128e7cb849c0a584"], 0x1) sendfile(r6, r7, 0x0, 0x8000) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000000)) mkdir(0x0, 0x0) getpeername(r7, &(0x7f0000000340)=@nfc, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r8, 0x40186f40, 0x76002d) openat$cgroup_ro(r8, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) 16:37:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x400000, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x5, [0xc0010015], [0xc1]}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f00000005c0)={0x3}) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f00000006c0)=""/4096) r4 = dup(0xffffffffffffffff) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r4, 0xc0e85667, &(0x7f00000003c0)={0xc0000000, 0x733c851b072ca358, "5d3230c5ee7a08942780e434f7d3454893a4e28f3320b2cd10c0724bada33380", 0x2349, 0x2, 0x9, 0x4, 0x7, 0x80, 0x3f, 0x7fffffff, [0x182, 0x4, 0xe3, 0x9]}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$vnet(0xffffffffffffffff, 0x0, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x200, 0x0) r6 = getegid() setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, r6}, 0xc) 16:37:50 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x2, 0x8, 0x0, 0x7, 0xed, 0x450, 0xc2d8, 0x6, 0x9, 0x7f, 0x2, 0xffff, 0xefc7, 0x954d, &(0x7f0000000480)=""/180, 0x2, 0x3, 0x7}) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7570706c6f7765516490003dff0f00006c65302c776f726b646972342e2f66696c65315fc812b4c401d58f0ee10d756ad618fa623b50a23162d9435a7bc39b4642b7c88a68904a6414ec1983ca0b8e157911ab0800ffe19ecb2097b6deab1ed118915cb3d0164e5476df"]) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCNOTTY(r2, 0x5422) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000400)={0x2d8}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x400c000, 0x0, 0x0) dup(r3) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000540)=@assoc_value={0x0, 0xfffffffc}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000005c0)={r6, 0x6, 0x10}, 0xc) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000140)='./file0/f.le.\x00', r7, &(0x7f0000000280)='./file1\x00') ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x5ae) r8 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x101000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r8, 0xc06855c8, &(0x7f00000001c0)={0xa, 0x9, {0x2ac365548300ddce, 0xffc0, 0x1, {0x5, 0x2}, {0x2, 0x800}, @cond=[{0x1, 0x8000, 0x6d0, 0x9091, 0x0, 0x9}, {0x6, 0x8, 0x100, 0x800, 0x0, 0x60d}]}, {0x54, 0xd89, 0x1, {0x6, 0x3ff}, {0x101, 0x4a}, @const={0x4800, {0xddbd, 0x100, 0x7, 0x1fe}}}}) r9 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r9, &(0x7f0000000180)='.//ile0\x00', r9, &(0x7f00000007c0)='./file0/f.le.\x00') 16:37:50 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32, @ANYBLOB="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"], 0x40}}, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = gettid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f00000000c0)={0x4, 0xd1, 0x1}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r1, 0x7, r4, &(0x7f0000000100)) 16:37:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x822}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000180)={0x200, 0x1}) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000), &(0x7f0000000140)=0x4) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x210, 0x0, 0x0) 16:37:50 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000180)={0xf919, 0x0, 0x10000, 0x400}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000200)={0x3, r3}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 191.195341] ubi0: attaching mtd0 [ 191.198758] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 191.361569] kauditd_printk_skb: 6 callbacks suppressed [ 191.361578] audit: type=1400 audit(1571330270.555:85): avc: denied { map } for pid=7976 comm="syz-executor.2" path=2F6D656D66643A627066202864656C6574656429 dev="tmpfs" ino=29319 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 191.368206] bond0: Enslaving bond_slave_1 as an active interface with an up link 16:37:50 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="142c230000"]) msgctl$MSG_STAT(0x0, 0xb, &(0x7f00000000c0)=""/116) [ 191.423662] overlayfs: unrecognized mount option "upploweQd" or missing value [ 191.466788] ubi0: attaching mtd0 [ 191.481938] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6b7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") fallocate(r1, 0x0, 0x200002, 0x7) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 191.533779] gfs2: invalid mount option:  [ 191.538056] gfs2: can't parse mount arguments [ 191.558461] bond0: Error: Device is in use and cannot be enslaved [ 191.572140] overlayfs: unrecognized mount option "upploweQd" or missing value [ 191.617507] ubi0: attaching mtd0 [ 191.621242] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 191.628449] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = semget(0x2, 0x2, 0x2c0) semtimedop(r1, &(0x7f0000000140)=[{0x0, 0x7f, 0x1400}, {0x0, 0x7, 0x1000}, {0x6bfc59b0dcfea08c, 0x2, 0x1000}], 0x3, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = dup(r0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4a23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='lp\x00', 0x3) open(0x0, 0x0, 0x122) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000380)=0x1) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x200, 0xb00401) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f0000000440), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000340)=0x4) clock_gettime(0x0, &(0x7f0000000200)) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000400)={0x1, 0x81, 0x5, 0xc6, 0x11, 0x1f, 0x2, 0x2, 0x400, 0x4b}) timerfd_settime(0xffffffffffffffff, 0x2, &(0x7f0000000240)={{0x77359400}}, &(0x7f0000000280)) recvmsg(r0, &(0x7f0000001440)={0x0, 0xc8, &(0x7f00000015c0)=[{&(0x7f0000002600)=""/4100, 0x1004}], 0x1, 0x0, 0x12, 0x7115}, 0x100) [ 191.660406] gfs2: invalid mount option:  [ 191.665942] gfs2: can't parse mount arguments 16:37:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010800000000084) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0xa}, 0x1}}, 0x0, 0x0, 0xffffffdd}, 0x98) sendmmsg$inet6(r0, &(0x7f0000002980)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c, &(0x7f0000000480)=[{&(0x7f00000003c0)="c2", 0x34000}], 0x1}}], 0x1, 0x20000040) 16:37:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x8a}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [0x300000000000000]}, 0x48) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f0000000200)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x44}) [ 191.783721] ubi0: attaching mtd0 [ 191.787232] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 191.852936] syz-executor.1 (8029) used greatest stack depth: 22736 bytes left 16:37:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x6, 0x80, 0x6, 0x0, 0x0, 0xffffffffffff09db, 0x871db8b72bc31d4e, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xbae, 0xa1}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, r1, 0xf800000000000003, 0xffffffffffffffff, 0x8) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f00000000c0)=0x3f365342, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r2, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r2, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 191.895010] ubi0: attaching mtd0 [ 191.898660] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:51 executing program 0: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0xffffffffffffff9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100000001}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 16:37:51 executing program 5: syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000000000}, 0x0, 0x0, 0x0, 0xa74804f14c45a962, 0xe7c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x9f', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu//y\xf3l\x00@\x05:$\x92\t71\xf7|6\xaf@W\xda\xea\xf2\x897~', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000000)={0x0, 0x6a, 0xfffffffffffffffd, 0xccd, 0x0, 0x0, 0x0, 0x3b, 0x27c0, 0xf, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x2000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2102) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = gettid() socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='keyringuser-\x00') write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x58, 0xe5f, 0x8, 0x2, 0x0, 0x3, 0x0, 0x2, 0x3, 0x4, 0xe4, 0x0, 0x4f15, 0x100000002, 0x0, 0x8, 0x5, 0x0, 0x3, 0x1, 0xffff, 0x8, 0x0, 0x2, 0x1f, 0x0, 0x2, 0x5, 0x200, 0x9, 0x0, 0x0, 0x0, 0x9, 0xffffffffffffff00, 0x5, 0x0, 0xf863, 0x2, @perf_bp={0x0}, 0x0, 0x8, 0xffffffff, 0x7, 0x0, 0x1a7, 0x1}, r4, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, &(0x7f00000002c0)=""/73, 0x0, 0x49}, 0x20) r5 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r5, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r6, 0x0, r6) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 16:37:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) r1 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000200)='sysfs\x00', r0) keyctl$set_timeout(0xf, r1, 0xef47) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x401}, &(0x7f00000001c0)=0x8) prctl$PR_SET_SECCOMP(0x16, 0x57efd8f132dbff45, &(0x7f0000000640)={0x0, &(0x7f0000000600)}) dup(0xffffffffffffffff) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4404c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b65d000002000000ff0f000000000000341780ec9245aabb18bd00000000000008000000000000000000000000000000000000000000000000000000000000000300000007000000d500000000000000ffffff7f000000003f000000000000007fffffffffffffff00"/314]) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000300)) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f0000000080)=""/33) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') 16:37:51 executing program 3: ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x4882) r3 = socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x9, &(0x7f0000000000), 0x20a1562f) bind$ax25(r3, &(0x7f0000000380)={{0x3, @null, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r5, 0xc0206434, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000000400)=0x10, 0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) close(r7) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000140)) listen(0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000000180)=0x0) io_submit(r8, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 192.117008] raw_sendmsg: syz-executor.4 forgot to set AF_INET. Fix it! 16:37:51 executing program 2: creat(0x0, 0x0) r0 = memfd_create(&(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x100) write(r0, &(0x7f0000000040)="0600", 0x2) pipe(&(0x7f0000000280)) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="40000000000025000400000005007c001db4aebf8173b439ab9200007737f8c34cd6edfb1c77ebdf7393b4df222d822ec2c15d9bf6e54f4435bb1bad0be4d2549461b79cb4961e544b93eb27db3eaf86d132c4e1c91fcc8cfdbc9ae600248c900373db120a3d8749fcaa8120dfa50221392d31e318175b4e2f13b1912e115d1341530e766856dcf101130202fa08debd4751eb0f3c0c6c19b6ed183f39e331a9248090c589df7b33868000"/195], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x80000, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1000000, 0x13, r1, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) ioctl$sock_ifreq(r3, 0x89a78b03c56c0ea6, &(0x7f0000000240)={'tunl0\x00', @ifru_flags=0x1}) ftruncate(0xffffffffffffffff, 0x8003f1) open(0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) [ 192.191705] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 192.220719] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:37:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xfffffffffffffe6e, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x7fffffff, 0x1}, 0x6f7923fc7c86ceac) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000440)="926fbd2aa351ce058aed884c702ad4b7ea31c478f4f467bde371c9311a1dd05497846e509ba847d361ff2ef1a3cfd339759fffe2fd0453a980b73056a9dab68187b4cca02aee1e", 0x47}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000240)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x401, 0x800}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8130, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="ee9d6d2f8d0c4703d49a5a870cf812242e5670e3a5977aad201b4133861bc69f6bf6fe822e12a5f976f013645977c0b5e8e6d4a0e1cbb74778d1f45270a3880dbc6f0f00003da4c08a87858773dae1b3c568cf44b350ecc2aaffd9459f9596fc48d8e6f053040c048509000000000000002962b06f3a31cf55888485035af4a459a047d6879b8b8d4f026a88133ee91c5c5a10ef2f1c849f0af8340736d5c5ce328084f547c48087f0f22685f93a27e8227a1f4cfdd3083a448a6a18b8b75540da15926ad37aa68cbaebf71a69d774f9ccfa569bab5a9f95233b12286bc163c1"], 0x8, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000f00f88)) syz_open_dev$loop(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0)={0x0, 0x0, 0x0}, &(0x7f0000001480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r6) setfsgid(r5) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000140)={{0x89, @multicast2, 0x4e22, 0x4, 'wrr\x00', 0x2, 0x81, 0x3f}, {@empty, 0x4e21, 0x0, 0x5, 0xa1, 0x1}}, 0x44) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:37:51 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) 16:37:51 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x3cd) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) recvmmsg(0xffffffffffffffff, &(0x7f0000004740)=[{{&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)=""/243, 0xf3}, {&(0x7f00000003c0)=""/129, 0x81}], 0x2}, 0x7}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/58, 0x3a}], 0x1, &(0x7f0000000540)=""/44, 0x2c}, 0x3ff}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000580)=""/92, 0x5c}, {&(0x7f0000000600)=""/213, 0xd5}, {&(0x7f0000000700)=""/111, 0x6f}, {&(0x7f0000000780)=""/87, 0x57}], 0x4, &(0x7f0000000840)=""/159, 0x9f}, 0x1}, {{&(0x7f0000000900)=@generic, 0x80, &(0x7f0000001100)=[{&(0x7f0000000980)=""/209, 0xd1}, {&(0x7f0000000a80)=""/204, 0xcc}, {&(0x7f0000000b80)=""/252, 0xfc}, {&(0x7f0000000c80)=""/218, 0xda}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000000d80)=""/251, 0xfb}, {&(0x7f0000000e80)=""/125, 0x7d}, {&(0x7f0000000f00)=""/198, 0xc6}, {&(0x7f0000001000)=""/99, 0x63}, {&(0x7f0000001080)=""/95, 0x5f}], 0xa, &(0x7f00000011c0)=""/191, 0xbf}, 0x7}, {{&(0x7f0000001280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001300)=""/149, 0x95}, {&(0x7f00000013c0)=""/77, 0x4d}, {&(0x7f0000001440)=""/190, 0xbe}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000001500)=""/101, 0x65}, {&(0x7f0000003740)=""/4096, 0x1000}], 0x6, &(0x7f0000001600)=""/122, 0x7a}, 0x80000001}], 0x5, 0x2, &(0x7f0000001680)={0x0, 0x989680}) sendmmsg$inet(r0, &(0x7f00000016c0)=[{{&(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000100)="2cc50fcbc4eafb8023549295086f66ce6eb37a3c78ead21e3552fae468ba98e0ff997ca9b247168c16331cfe661505a5db060a6460bbf11c5b4ff15eef878d7cc34a2a5969075ec79ebc5834adfcae447d94a5d46cd91652b20d8b748f39cfc118b569709abf059e59ae525582a0817bef1f9245aa15453aa4b6e4f40a87557288f03a55a9a7c91319429f546d8f01c66084", 0x92}], 0x1, &(0x7f0000004880)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xda}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @multicast2}}}, @ip_retopts={{0x28, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x5, 0x1, 0xb, [{[@loopback], 0x20}, {[@remote]}]}, @noop]}}}], 0x78}}], 0x1, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) 16:37:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/access\x00', 0x2, 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpgrp(0x0) ptrace$setregs(0xf, r3, 0x7ff, &(0x7f0000000440)="46fe1380eceb931f64314b4885ac378072f30c9a14707f930df23aa430450de625090f74ca8749ab4aa8ec85432078175edf1c52dfd579a0e737f5f0e9c19477d20c154cea09bf23026fdf3369709621") r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r4, &(0x7f0000000040)="2aca2e253b930fc79a202e700799fc61c0d13b0e93d4c5e91a1d050a6fd220ca6607c88fef3a7dcaa738c096c3d42caaaf0d334a03e39a1ef8f48a65cc202117811df9fcea198abc509b2648a729db644cb659b9ff709f8229472298188781171c773f60e4bdb8bd476e1ab28ee36b80c5576f1ee0e6139804d057574ff89caf2e74dcf790706493ebb8fd591bca510961cb369b3d4ae378e7356c61ed9d0251b10dd28cd02f064854bdd4e3be7a07d07df4f811c79e18acb2c8f8d575e5a8e28a1e744b3edfc42dd3d1d04cf06b6c03bee546c6a29661cf387d3d9dbaa3fe57", &(0x7f0000000240)="a6a0cfb3135fe23c62fd7a5f6fc069b9ee2b64a433705398651467fba2b64b6661e0c918110688aa4c56aa826654a9fc7e41f1737da1a22efa81c34820ed44476bcb1bfcd162d9b282501ed3093136812a83cc522690cab3f1a17fe20df8915629393a9c1801b14dd1dd95940c9d15f139f4b4018e888f464709e661586ce36a0a64c32a65bd77f581dd024199cdba1173e612cd0a40d2a28e69e7b5a1dbf4bb0df9", 0x8}, 0x20) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) recvfrom$netrom(r1, &(0x7f0000000380)=""/55, 0x37, 0x2001, &(0x7f00000003c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) setsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000000340), 0x4) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='dax\x00', 0x0, 0x0) 16:37:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000200)=0x80, 0x80400) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@setneightbl={0x7c, 0x43, 0x100, 0x70bd2c, 0x25dfdbfb, {0x7}, [@NDTA_PARMS={0x68, 0x6, [@NDTPA_BASE_REACHABLE_TIME={0xc, 0x4, 0x2}, @NDTPA_LOCKTIME={0xc, 0xf, 0x800}, @NDTPA_PROXY_QLEN={0x8, 0xe, 0x3}, @NDTPA_IFINDEX={0x8, 0x1, r1}, @NDTPA_UCAST_PROBES={0x8, 0xa, 0x10001}, @NDTPA_PROXY_QLEN={0x8, 0xe, 0x81}, @NDTPA_LOCKTIME={0xc, 0xf, 0x32e0}, @NDTPA_LOCKTIME={0xc, 0xf, 0x2}, @NDTPA_DELAY_PROBE_TIME={0xc, 0x7, 0x9}, @NDTPA_MCAST_PROBES={0x8, 0xb, 0xb9c}]}]}, 0x7c}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x0, 0x40001) fcntl$setstatus(r2, 0x4, 0x4000) unshare(0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 16:37:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x7) sendfile(r2, r1, &(0x7f0000000100), 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) [ 192.590908] ubi0: attaching mtd0 [ 192.612426] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/159, 0x9f}, {&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f0000000840)=""/98, 0x62}, {&(0x7f00000008c0)=""/152, 0x98}, {&(0x7f0000000980)=""/160, 0xa0}, {0x0}], 0x7}, 0x401}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)=""/125, 0x7d}], 0x1, &(0x7f0000000e80)=""/190, 0xbe}}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0xfffffe60) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r4, 0x8924, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0xffffffff, 0x0, 0x3}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\x00\x00wJ', @ANYRES32=0xffffffffffffffff], &(0x7f0000000180)=0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x72, &(0x7f0000000000)={r7, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={r7, 0x7}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000380)={r8, 0x7}, &(0x7f00000003c0)=0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_TPR_ACCESS_REPORTING(r9, 0xc028ae92, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r9, r10, 0x0, 0x320f) r11 = getpid() r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xfffffffffffffffe) rt_tgsigqueueinfo(r12, r11, 0x2a, &(0x7f0000000100)={0x7}) ptrace(0x10, r11) ptrace$pokeuser(0x6, r11, 0x388, 0xfffffffffffffffe) r13 = syz_open_procfs(r11, &(0x7f00000001c0)='net/igmp\x00') preadv(r13, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 192.667767] ubi0: attaching mtd0 [ 192.671713] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:51 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000100), 0xa}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000014c0)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000240)={0x40, 0xb, 0xfffc, 0x3, 0x6f, 0x9, &(0x7f00000004c0)="1b2b089891e6fbe62285fbc5ba156ebb28183f827a5495dcd0d229b790af91664aaebfebde54f788a52d375e2f1bb263689a9c9efcdb6a8842ed1818bc4c181aff8b1f83441dc3a5ffee9943527116636a2befe77a2c1baa2146f1b7e51158a9fb1c2095d1381bdfa143d44d3593fb"}) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f00000003c0)={0x7, @raw_data="8744dd28e943ff91323c3cbaba7694deeeaac414a49a3feb64443e53a8fae0b53aa13ea745dcaba41438b884b63ade4f8c5b3f5f5d95d48ce6ff848dace7e7067b2e7d95942e430af874dfd709df135c7bb8f513876ea8e394c010540fe46a6c4545e8115475cc44324b1dfaad0231b9e29e3e35f029ba592d72d5f0f536289ee8befdc1c8c97aa4ed7143d04c9c26c503a0194ee82515dd5a1aa3df86a384a61a17e054668003279e78a1726325df4a5312c913845725bb568b0d3ec6aafe968ffb119066419a54"}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) msgget$private(0x0, 0x0) socket(0x10, 0x0, 0x0) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) [ 193.188154] audit: type=1804 audit(1571330272.385:86): pid=8080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir183083562/syzkaller.0SoPEJ/38/file0/file0" dev="loop3" ino=204 res=1 [ 193.288192] audit: type=1804 audit(1571330272.385:87): pid=8123 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir183083562/syzkaller.0SoPEJ/38/file0/file0" dev="loop3" ino=204 res=1 16:37:52 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="79d589020078587ce510906b29489fb394566ee14ffedd5d2f7d471d05851c09d3497771072aa587123d8bc2fc2f2fbdc3aec2f287f1b2c2b69a140e8aab4b28ee01846fe2891b973f2a77f017a8a8c07a"], 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa0400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x10000000) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) sendto$inet(r2, 0x0, 0x0, 0x400c000, 0x0, 0x0) getpgrp(0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x0, &(0x7f0000000000)) ptrace$cont(0x4201, r4, 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = dup(r2) sendfile(r6, r5, 0x0, 0x5a4dfa21) sendmsg$TIPC_NL_BEARER_ENABLE(r5, 0x0, 0x4800) ioctl$TCXONC(r5, 0x540a, 0x5ae) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r7, &(0x7f0000000180)='.//ile0\x00', r7, &(0x7f00000007c0)='./file0/f.le.\x00') openat$snapshot(0xffffffffffffff9c, 0x0, 0x10142, 0x0) 16:37:52 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r4, 0xe4b, 0x2f}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYRES32=r5, @ANYBLOB="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"], &(0x7f0000000340)=0x6d) socket$inet6(0xa, 0x802, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r7 = gettid() syz_open_procfs(r7, &(0x7f0000000000)='syscall\x00') ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x3, 0x0, 0x0, 0x80000001, 0x40000c2}) r8 = syz_open_procfs(0xffffffffffffffff, 0x0) write$P9_RSETATTR(r8, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0xffffff70, 0xfff, 0x476, 0x7, 0x1, 0x7fff, "730cde69557836e6e55d1929a3ee1e624fdd34019a2ec69bd80d5a9780777ea8df6fe78c4ad773917be516ccf7199b2d53ec8e24d32957f754c09e88fb8c1cb60722a793e1cac424fd702d9d70b4602182bef9963188f90aefbbfa05714d76e1c872263ca98afe4e7fcff3b6cf3a803e1cac8be4dbc0664ee51980d8a17d58bbf48c80da9d9ba78e6ae575988ba5"}, 0x1a6) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) connect$unix(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r9 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r9, 0x0, 0x0) getdents(r9, &(0x7f0000000140)=""/133, 0x144) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f0000000040)={0x3, 0x9}) 16:37:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0x103, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000200)={'nat\x00', 0x38, "95bbc47f6004ef88859ff568a6843d5b53b1eab06c22b6d6ec35766204cef40420e3de7d2bfb74035e44ada541fd08c3aef8768798593a47"}, &(0x7f0000000140)=0x5c) shmat(r2, &(0x7f0000fff000/0x1000)=nil, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e22, 0x80000, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts_2292={{0x18}}, @dstopts_2292={{0x18, 0x29, 0x3}}], 0x30}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000100)={0x0, {r3, r4+30000000}, 0x2, 0x6}) [ 193.399713] ubi0: attaching mtd0 [ 193.406198] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:52 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000006c0)="2a9eb4219270262682043f74fdc7c796966cf61d7ecf1cce308dcc832c6a2e8e1f3ae2ee56457ea4074b498c3dbff3797bcc8daf9a0f7a64e2fbc526df1d60defa55d70b93213dd09b533533fe1764c8ae882e7003b16d5a15ac78ba95fa3776e387323b9aee135b530a177f4470cfc70e306499ee944e0608cfbe58d639bd59a77a64dc720924d5c0db0d76c8952a4f56db3c84c49b2519edcf376db82d220644a33d233188e36a46f95770d760c4137326ec902794b71f96cc260f0d454d80309ecbff9460ed464b4c069a93cbc5f326732eab00"/230, 0x3024dfef) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb5094", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) setsockopt$inet6_mtu(r6, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r6, 0x11, 0x0, &(0x7f0000000000), 0x4) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r8, r7, 0x0, 0x80000005) getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100), 0x10) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r9, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x200008000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 193.548315] ubi0: attaching mtd0 [ 193.564311] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:52 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000100), 0xa}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000014c0)='TIPCv2\x00') socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ADD(r5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0/../file0\x00') chdir(&(0x7f0000000200)='./file0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 16:37:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0x103, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000200)={'nat\x00', 0x38, "95bbc47f6004ef88859ff568a6843d5b53b1eab06c22b6d6ec35766204cef40420e3de7d2bfb74035e44ada541fd08c3aef8768798593a47"}, &(0x7f0000000140)=0x5c) shmat(r2, &(0x7f0000fff000/0x1000)=nil, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000080)={0xa, 0x4e22, 0x80000, @local}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@dstopts_2292={{0x18}}, @dstopts_2292={{0x18, 0x29, 0x3}}], 0x30}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000100)={0x0, {r3, r4+30000000}, 0x2, 0x6}) 16:37:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x7) sendfile(r2, r1, &(0x7f0000000100), 0x2) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) 16:37:53 executing program 1: r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'veth1_to_team\x00', @remote}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000300)=[{{&(0x7f0000000040)=@l2={0x1f, 0x0, {0x2, 0x8e, 0x27, 0x5, 0x2, 0x80}, 0xff, 0x40}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="63e37ce30db848f8bbd5df65db0fc9cf34768c701a1be9024e686b6a71252786023f39698709b26e35c04af950a82212a307cce58d77308e74546f9e6805a01002fdf32ad4b59079978a20ab201ccd85a7cf4640a2f28e915468628906245a8833a9120e1cd59ec56ab82e3898b0a53405faf5485bd3d03aaa6a8eba45a88b46533c7dbb37bc2393774fabfa95894d56e260dd77b09cf5016545d324d594e16a91f4a5bc6e736faa7644b2f05945c98aa51519ce54b4354907e49e56644771f171cc1a20cd632b7f5f5fe5b4de4ee7476a8bc9ccbbd9efcfd2b70956b6468b", 0xdf}], 0x1, &(0x7f0000000500)=[{0xa0, 0x10f, 0x2b0, "346dfd8e1b8162ee98642267bd4ec181e6e05c833f6a4dec70141833e508aeed2e410b8955d93f9cc29be0d82dd3a23d62adae092213c9ff940c8b99581f86fe26d4860ffbad6abec03bfcf5044fe277feaea41823cecf0d7f4c91a68b55f29097395e419b50b47f28f433c738f3ce30b2bb0bf001a69f941be69ef95d1d21a9b26d9196400e656973eaed1d95e381c6"}, {0x88, 0x101, 0x1000, "c7c4014387a59e9b639d8bc90c09029049caa604aef70217ef3831289fcaaf86163bb758550ca84e4a9c284af32cc2723a49258521a79310e32a15e604d7fc4c2e2a5ba03d665e001153ae2796974d25807a728fd5b392fdd772f02255675142e06cc283b16f6861ab73c200ca92ad183228"}, {0x30, 0x108, 0x1000, "ea9aa1b223b4f894754293e656682c72f40baea36476ba3e4f"}, {0x48, 0x117, 0x5, "13e55744a2b4e4a809cd7c05c05cd0398cc357e06631e89483a86ddd2cf3aa816d2cb0973c1ebc48d9e4ad68ff369e0bad3455"}, {0xe8, 0x88, 0xbd, "02c203a63f2b250ceba9eefd86500f1f85a424e9ebd618a0f27d9b29bde43ec6b7f525cd4f2d80828290b0642838647868d504417bd07250f41722532db423ad17504dd3f537a40a7ec986910154b5ab70c3ea02671ac423e962930321645b23df7e2a8017efeee3b464c050939142f5ba71afddba2296bc34e726774191e3aecdd154efb22a429acc745668288c27d6c1d65478562bd7d41b1e39457d83075dfcb24bd30e9be808c5d10fc033704fe112a3948013b443a6be65b6c81126d35996eacf02840a0abccf02e495d96bfb6abfe09cb2cfd7de"}, {0x108, 0x108, 0x10001, "c4def44d69f77140d2ff93b1f942ef1291f3c05d2696c654c280331ba6b99a63977e9d714539800c0b34e087e2793f25b054484e38d5ea3dfb8920a92fa584cbf86ffad2c60ab03ed726b3e98da82ff4d37168504f518f10fdf5cec3ba6bf86d3d9fbd6bc305733f1787f4ed167c480309dee6384baa12e56c2ffab1d3cc19755893fe5bd38952d57ef13ff93fa4a50172742340f120c31d594c065907f7fdf9547c56863447fef33079d2dbae54d27f4bf2ca1a7accf5132017afa2628e192b6020a57674fd66116508efbd518381d4f3671e7e121eabd6e7bc809f7a3cb2e0fbdf13c69655e6fc4d1636a74ecb25bf829482e17dadf1"}, {0x30, 0x10d, 0x2, "308251433e069b6c05e0ffc1df12c5583284d571d2065abc9a3463"}, {0xa0, 0x117, 0x2fc9d72, "e1be0b2f55a1e7627da4561650204f58149bc8d184c76439f0570652f0fd57595935f2fc64312a588f556e788e6acbd13457b958c631f12db12a33fff70f3393da71eec16c815a0bb74f0c75c8477197cbefd97fee423404f224f598106bbd3f193677f002612fab9f4e51247b93622f05b134c972519ff4a6c381d0274691b17fc1ddfc3e7424eea77a4b6a"}, {0xa8, 0x10e, 0x80, "d4994452861474cd5a1326791b937be5c85fd6916933ca63129dcfad02ebe256023377defc6a79ff7659ebeb8f9b1d76d0fb7d7c5d3edff9e5751f1f1572add61caef1035a80d90ef20c3d81bbe937f3059e707d83831e7363dcb20db32160413b49a681933acb0c7b4707b177fb5b49dc12a933c704ed8be578a8da31d9abf21e4da63bac2a8c4ac2d37c6484539f42ba2e930f11ddac"}], 0x508}}], 0x1, 0x0) [ 194.100656] ubi0: attaching mtd0 [ 194.105561] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:53 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1adb24301162b90f, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x85', 0x241, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net//yz0\x00', 0x1ff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x21ffc, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x18, 0x0, 0x3ff, 0x83d3, 0x44, 0x1, 0x805, [], 0x0, 0xffffffffffffffff, 0x1ffffffd}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="0000000000000c009500000000008000800000200041687f"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x5, 0xffffffffffffff9c, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000540)={'dummy0\x00'}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x0, 0xffff, &(0x7f0000000680)=[0x0, 0x0, 0x0], 0x3}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'yam0\x00'}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup(r5, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x40020a) write$cgroup_int(r6, &(0x7f0000000080)=0x16, 0x12) recvmsg(r3, &(0x7f0000009100)={&(0x7f0000008d40)=@hci, 0x80, &(0x7f0000008fc0)=[{&(0x7f0000008dc0)=""/22, 0x16}, {0x0}, {&(0x7f0000008f40)=""/121, 0x79}], 0x1e1, &(0x7f0000009000)=""/242, 0xf2}, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(0xffffffffffffffff) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.swap.current\x00', 0x0, 0x0) 16:37:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) io_setup(0x101, 0x0) syz_genetlink_get_family_id$SEG6(0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='tracefs\x00', 0x10002, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 16:37:53 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) io_setup(0x101, 0x0) syz_genetlink_get_family_id$SEG6(0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='tracefs\x00', 0x10002, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 194.446352] device nr0 entered promiscuous mode 16:37:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) dup(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sched_getscheduler(0x0) r2 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000d5010400000000012efe0000dcd86c68f379241a3384baa5b5db0700000068000a010000000027db6ea8945d97f9e5cd3d606bd67c91e866bf72b366f513c794bb850789073e"], 0x4a) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1a8e7c12, 0x0, 0x0, 0x2, &(0x7f0000000f00)=ANY=[@ANYBLOB="6e6f71756f74612c75737271756f74612c626172726965722c67727071756f74612c6e6f62682c6e6f6a6f75726e616c5f636865636b73756d2c6a6f75726e616c5f6173856e635f636f6d6d", @ANYRESDEC=0x0, @ANYBLOB="2c9ba280378d", @ANYRES32=r0]) 16:37:53 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xa60000, 0x0) ioctl$MON_IOCH_MFLUSH(0xffffffffffffffff, 0x9208, 0xffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, 0x0) fremovexattr(0xffffffffffffffff, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000300)={{0x1}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000200)={0x5, &(0x7f00000001c0)=[{}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f0000000240)={r3, 0x2}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x6b) getxattr(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="748175737465642e232a7b5d706f7369120061636c5f8c5c9e706406a90bb3d0908daff5369b8897ccbcb75a6c32e558c9f2cf298f"], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, [], [{0x100, 0x20, 0x6, 0x0, 0x0, 0x2}, {0x2, 0x3, 0x6, 0x5, 0xffffffff00000001, 0x3}], [[], [], [], []]}) 16:37:53 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) bind$x25(r0, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r0}) r3 = socket(0xa, 0x1, 0x0) close(r3) sendmmsg$inet_sctp(r3, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r5, 0x10000, 0x48}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r6, 0x3b}, 0xffffffffffffff1e) [ 194.576281] sg_write: data in/out 262577/32 bytes for SCSI command 0xa-- guessing data in; [ 194.576281] program syz-executor.1 not setting count and/or reply_len properly 16:37:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80800, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000002c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000040)={0x4000000, 0xbe, 0x1}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:37:53 executing program 5: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x40) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000e00)=""/4096, &(0x7f0000000400)=0x1000) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) r2 = socket(0x1e, 0x2, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000200)=0x3) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x69a5bcff2ec4f24e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c3, r5, 0x1, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x220000, 0x0) fsetxattr$security_ima(r3, &(0x7f0000000280)='sma\x00', &(0x7f0000000240)=@md5={0x1, "1e80978a24f31f9a934593a84ea5363f"}, 0xba, 0x2) 16:37:53 executing program 4: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, 0x0) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0xdbe5a3529e0de897, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000280)=0x4) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r5 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x80000000000000, 0x37ec40f7e98a89) ftruncate(r5, 0x200000007) ptrace$setsig(0x4203, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$vbi(0x0, 0x1, 0x2) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffffff}) r7 = dup(r6) mmap(&(0x7f000000e000/0x6000)=nil, 0x6000, 0x0, 0x30051, r7, 0x0) r8 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r8, 0xc0184900, &(0x7f0000000040)={0x0, 0x2b, 0x0, 0xffffffffffffffff}) dup(r9) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/create\x00', 0x2, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/btrfs-control\x00', 0x10000, 0x0) [ 194.775053] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 194.802308] audit: type=1800 audit(1571330274.005:88): pid=8241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16688 res=0 16:37:54 executing program 3: getpgid(0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x4, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140)='ip6_vti0\x00', 0x10) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r4, &(0x7f00000002c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x32) pwritev(r3, &(0x7f0000000640)=[{&(0x7f00000000c0)="22d200e8b4717602eca59e962f891ad227d70996c6eb192dca05aacb02f31bf08bb8e0c05b40fef1ccc6195bef967b2e481d9d8101d444c463798ef46f67c4764e806212d00ecf674667c53781c206f7e9dbef02008d8926eac372fad5a5d03dff411ce868faadefb78b0c5dd10a51e37039c0d1f1e4f0190f1675ceaec71c93", 0x80}, {&(0x7f0000000140)="611dae001af11860165d99e5be1054b437ab85cf18c4d711ceb15797b1deb8d34490bd300ba73679f2b773619fc8bf6e87039697c479ef", 0x37}, {&(0x7f0000000180)="950229a03ed2d0816a3d05fa4988a1fb16dd8298fc584efc7a49a376ad05d52996461739862e34746cf2cbb6b452d0e991c8d1a31a4ec30df8462cf081417104b2c6e24712821f39ede78b416e17ac22eac64f513295c1650cc5a69c1a4c6cdcfec31c359d83bfc0f95b9dc5ab8e7ad500f0ef1f4d50fe42cff71376146665b17f4613", 0x83}, {&(0x7f0000000380)="b3be886eed65e9a3d341d4093a52a5a85956e15ef3c23ea32144b29ab566dd8636cf497311fea8ae4a94b97904ac0c440f21108f7f678eac8ae3ab1cbc56877078c68212ea32e26b311064b07f8031bfaa4508fd2f884807def3195e65984ded7a1eb8", 0x63}, {&(0x7f0000000400)="727f207e486544505d99ff7bc847de136ba5ff833b96f96f3a870956bd48810b61e7cd66e50098eacfb79f69c1021299f1de68481bcdd5b1e8dff89048c67ffd9234e376301120f25705a78b48234dde5a2c11bca805566d27f64b8257f7abfdbaced3375d02723c286d5f0623f4d95ddc637a57e9f01ef0", 0x78}, {&(0x7f0000000480)="4c730ede6da7e1b38f5a1ef6480ae3647e95a12a2f40cefb1232998b0616404139ddd2a6b75fb4be647d26fb794c590bd8f418130b0a556fb4542c0c528d5ccacde34b9961d5d3aa5e84c18c70734c21e9763e17a874b13dafa904bd8dcca04f1f015b4680ea9c205ed965daf309714d0b477564c1d6da98d4dafe00e2438fb8156f43964e8088a0fa1047418850ee07a7de08d2eb6c55c54e8664856d4501f928b8ff691fc9760ad41e06332f0b79ee46d65898802f9594827840232130d44d69dcf42afa083c022edade29661f8a7e60618a560f61e63b0de2f0d8c59c9664bb54", 0xe2}, {&(0x7f0000000580)="31b651683a87a3b00ef9eeca4329ef23e57d5f90346c891a49755c143af0eabbe443d177f9a693a4247d7e50574a4b557dff2960c4e4d5b3d9c923398866ce54e72964668546c5397d998547f36335872ab72c403504a65fa114f3698f737f66e5ceb1d16e7ab95f102f34457d863be9a52249b22d9fc9510e8c0e704732776face69c1b6771a8013da7c8fabbf8ac5f079518aea20f2da4a83b", 0x9a}], 0x7, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)={0x29, 0x4, 0x0, {0x2, 0xf88, 0x1, 0x0, [0x0]}}, 0x29) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40014000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x60, r5, 0x4, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8004004}, 0x40) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0xffffffffffffffcd, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3, 0x4061}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x20000140) 16:37:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000340)=""/79, 0x4f) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x1, 0x800) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000300)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='netdevsim0\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=@newtfilter={0x34, 0x2c, 0x701, 0x0, 0x0, {0x0, r3, {0x4b53219d9451f1e4}, {}, {0x3}}, [@filter_kind_options=@f_rsvp={{0xc, 0x1, 'rsvp\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 194.975184] block nbd4: Receive control failed (result -22) 16:37:54 executing program 3: syz_open_dev$usbmon(0x0, 0x0, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x22a30, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x14}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0aaa7fc37bd440c2ea6599e24d66405bb48bcfa98288ee8607032d55e3c40d11ab81fef5bb7f7d17e688c345d496f6975ffe9d2ff6bb2e38910798fc7454ae92070dbaa7e5e92da22101700"}, 0xd8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x104000, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x9000004}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x68, r3, 0x200, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x2, @media='eth\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}}, 0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000280)=0x7, &(0x7f00000002c0)=0x2) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0xdafd7d7e85843d1c}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x1, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61400, 0x0) connect$nfc_llcp(r5, &(0x7f0000000100)={0x27, 0x1, 0x1, 0x0, 0xff, 0xf0, "7235eb0931020b2089f53f7492a13e91f73918296956d417c26b4bde39cbdbb8a1123641e4990bda40e6a81ef503b1294e6974ec869be7f967aefd98f9b7ef", 0x4}, 0x60) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 195.022724] audit: type=1804 audit(1571330274.035:89): pid=8246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/46/file0" dev="sda1" ino=16688 res=1 [ 195.029885] block nbd4: shutting down sockets 16:37:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000300)) [ 195.127089] loop5: p1 < > p4 [ 195.148449] loop5: partition table partially beyond EOD, truncated [ 195.168102] ubi0: attaching mtd0 [ 195.183266] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 195.190778] block nbd4: Could not allocate knbd recv work queue. [ 195.208134] block nbd4: shutting down sockets [ 195.224847] ubi0: attaching mtd0 [ 195.228315] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 195.241574] loop5: p1 size 2 extends beyond EOD, truncated 16:37:54 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) sendmsg(r1, &(0x7f00000000c0), 0x40100) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) write$P9_RAUTH(r2, &(0x7f0000000280)={0x14, 0x67, 0x2, {0x20, 0x1, 0x2}}, 0x14) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup3(r3, r4, 0x40000) getsockopt$inet6_dccp_int(r3, 0x21, 0x1a, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) [ 195.244520] audit: type=1800 audit(1571330274.045:90): pid=8246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16688 res=0 [ 195.296418] ubi0: attaching mtd0 [ 195.299900] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:54 executing program 3: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x1, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = semget(0x0, 0x3, 0x0) semctl$GETZCNT(r1, 0x3, 0xf, &(0x7f00000003c0)=""/148) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000100)=[{0x80}, {0x800006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x1000, 0x8, &(0x7f0000a4f000/0x1000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) shmctl$SHM_UNLOCK(r3, 0xc) setxattr$trusted_overlay_upper(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f00000006c0)={0x0, 0xfb, 0x15, 0x0, 0x0, "d709e882a7d2dc00"}, 0x15, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fchdir(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c010000100013070000000000000000fe800000000000000000000000000200ac1414aa00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff02040000000000000000000000000100000000320000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000004c001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000"], 0x13c}}, 0x0) [ 195.371628] loop5: p4 start 1854537728 is beyond EOD, truncated [ 195.447029] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 195.486097] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 195.511051] audit: type=1800 audit(1571330274.715:91): pid=8263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16688 res=0 16:37:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0xffffffffffffffc4, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000200)=0x80000000) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, 0x0, 0x0) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r8, 0x4c80, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r9, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r10, 0x6, 0x1, 0x0, 0x0) r11 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r12 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r13 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r13, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) r14 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r14, 0x40186f40, 0x76002d) r15 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r15, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r16 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r16, 0x40186f40, 0x76002d) r17 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r17, 0x81007702, &(0x7f0000000100)=""/148) r18 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r18, 0x6, 0x1, 0x0, 0x0) r19 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r19, 0x6, 0x1, 0x0, 0x0) sendmmsg$inet6(r3, &(0x7f0000001b00)=[{{&(0x7f0000000300)={0xa, 0x4e24, 0x216a, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x21}}, 0x4}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000680)="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", 0xfffffe42}], 0x1, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000001e00)=ANY=[@ANYRESOCT=r4, @ANYBLOB="ee8e0af53c3de218228de4f717d3e785befa897b86ac3cdc6d2c5dfbad157015f07cfd7a83074cfa5637ba51a5e74d4e5eae205991a08365f53984e76c28ae64a10b239214a99f56129102eef173b778dd70ab6665397b4dd957b4d748060598ec1a0f3517973f1aeb0b46d45b91744aba56b33828cc9609db0767940880dabc63", @ANYRES64, @ANYPTR64=&(0x7f0000001880)=ANY=[@ANYBLOB="e87afff4a8f6ef340b1784a89f41d644904dfa2dbe12aba04535a85152df86184220d27451b0e43b5439dfc9bfaab44bfe61", @ANYRESHEX=r5, @ANYRES64, @ANYPTR], @ANYPTR=&(0x7f00000004c0)=ANY=[], @ANYPTR=&(0x7f0000001900)=ANY=[@ANYRES32=r6], @ANYPTR=&(0x7f0000001940)=ANY=[], @ANYPTR64=&(0x7f0000001980)=ANY=[@ANYBLOB="62a21ffe69e0b2c1f1156438f6626e92bce117fb11ab07c273915116c38f8d9953f07cf25a0826dfba8513f74eed14c4aa240bbf9ecf5eb5202b603ff75df275afca310a3ad65b3a653b3244a84634c37ae0569b1b57ab0cb1acea90fd04dbf73f89b6c56efe2d01dc2ccd9e4e4ea599f327", @ANYRES16=r2, @ANYRES16=r3], @ANYPTR64=&(0x7f0000001a00)=ANY=[@ANYRESOCT, @ANYRESOCT=r9, @ANYRES64=0x0, @ANYPTR64=&(0x7f00000036c0)=ANY=[@ANYPTR64=&(0x7f0000003300)=ANY=[@ANYRES32], @ANYPTR64=&(0x7f0000003340)=ANY=[@ANYRESDEC=r10, @ANYRESHEX=r2, @ANYPTR64, @ANYRES32=r11, @ANYBLOB="5f4f2714726a056508ae2cc4d35b6dfb06dcee5622815a04d54fa24b5f68f7719e58bfa5f2d37d00e3db50914db12a24643797412031cf52333fb1df3c767897818972040bed1516540bd8024b9c8b44b5cff282b73b98416fa71d26d4b40391649a2256018ad7de5d9b103e4c63e133b9a091c0180175a68083be1ea80f4366a8c9fc771081c8842b4bb6cc4cc0c2d20cbe862828fce7512f32ebe9b56d6c9cd1fe19549b883291f71c8cfb9d747375539e33503d082f5e89f8ec0d0c169879927ba917bc2c766592f815882321dfeff0b03dee81", @ANYRES16=r12, @ANYRESHEX=0x0, @ANYRES16=0x0, @ANYRESOCT], @ANYPTR64=&(0x7f0000003480)=ANY=[@ANYRESOCT=r13, @ANYRES32, @ANYRES16, @ANYRES16=r14, @ANYBLOB="4c49af32cc0a9d3f14b5b679b7bd4c9ba00407fb113830c601ea5aea9edff8d4e8e9550e5760f1e28884ebd61c41053c4c03083d3fbf1098f29405877b6b2a26ca35ec41268055f204e25c0cbdca7006dd5c40432c9e519e5140e1984cf19f7b304029df3a98ab37fa769700a2a1d9c104c84b35efa3ba110981f1f84341254f94e550bab374d77ad94d8ef8f220d46dfe82b5d1372afe6598db44aa0c8092c6cf04d45eb4580caff1f39236fdffb6fa2c83fc297d4c8050ed2daddad9b8645726c34a8a55bb2cc0f50d342fa6483075147bfafe918b485955e9091fa231b3e5ebefe12d064e8badafc519fa49e9e31c7c7f366d7a24", @ANYBLOB="b587f93874", @ANYRESOCT=r15, @ANYRESOCT, @ANYBLOB="c500310451025c760feba500e0deb9ae49c25b8efabb5d573dbf62583f14b3cf58c90c1b16001131eaaac697425fffc6a639f9127d69880c5c4f5798518ddc537043760094862759a87da66c5b89de6f8f1fcc57ea2bde8590ea53534d84b041870a42dacf8697047faade82553cb5126947fac727a3045b50922abc25ac398ee52d0d1c241d94dcd44434eae89f37e0a2c50659cd78ce85d9a2026730dd42b0f9b712965c0e48b42500cda821", @ANYRES32=r3], @ANYRESDEC=r0, @ANYRES32, @ANYRESOCT=r1, @ANYPTR=&(0x7f0000003680)=ANY=[@ANYRESHEX=r16, @ANYPTR, @ANYRES16=r17, @ANYRESOCT=r18], @ANYRESOCT, @ANYRESDEC=r19]]]], 0x8}}, {{0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000003740)="8bd19b76e07b67623a0ef00a4cf081785e16de2740cf7402f7ba037cfd827b56add5f2d7956a32d947d1ac8bfb508a7b5580aca45de3cab348fe7680cfbdcc120bbd4dd5cf98d89b6508ae3ed4d5e36cfb658ff6dce5c35549ddf4ccb03ee86c84bfb99631c5cb56f4a3d2ef83023897dd3ae55988306f815d6b50f3f20886c46e8e0ab94f82f792b2994a2dc797965b92fa2128cb74346c5c8bf86c7ea6c8cfde1c47d9a6df6b555778584385e2c69da11068739ec6958df2622052d5e11d8c5d38f0b8f73dfb1c34639b3ba01a74b5f5bc10b824e76c"}, {&(0x7f0000003080)="2fb286938bfd7f07ea0934d52f116b526de3b51a3e261b2a80a064700302cf1ab820de6e445d8d93487868138cf27e802ebc62d085a528c0cb6c2e04271f194f78d1bebb1217fef2b808731f3aa6426c312b70259870cdaaeabd62e634571d4ac03e7087ee6478c4c707998d15060fde330612d576bc6a263441526a66340fac49ffc6764e158aff86a3bc302d92df61ef8eabc2f57194c7faf2b999d2f618c32530f1be4c31baaf089fb2c5fe141b99473aabc20edac98f4b795d1ef85be0c45a18f662a1cc92cf"}, {&(0x7f0000001a40)="a20c4f2ccd9c0e8cd2bb4f21d989b57165ee03ca388544de69e7dc8ba8743f"}, {&(0x7f0000003180)="43ed67120d8865314ac6e9789fe55afa686f972b1baf91af4ffb335303b63b02d021020ec5bfca2ecc314653de3524b4d82aecc6fadecb682a9458391c4e9dc129b344851417edcad2b7e55a3b9ee69e793b1b869a1399fb1a3b4afbc0fcec8bafd8357d82b1120984d4a7221ba01de9a09238005a305397be54b274fba185ca3a3689f9c7d2401610bb24f996963d6764ad028d069d14bcbacda04200b696f047efac2c6927c7733033254ce3dded92431ea9ef7465412c284bdc98a67db4ea5c726d43d2d44ea117e403ad7e1f8283ca26275694"}, {&(0x7f0000001a80)="e7762e97fab731f3dbc8db2ae90fd248641edcad603acfe0f4bbb18c55a5bd9887a5167d5ca5f468269ba7726a9d679a575ee914c53321815c085cf61cc7d8e728dd7983c2ccacf190c401924d447b05e3bb58be4b6f35e1ca9fff"}], 0x0, &(0x7f0000001b80)=ANY=[@ANYRESOCT=r3], 0x249}}], 0x6bf, 0x8804) r20 = open(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r20, 0x8904, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x57efd8f132dbff45, &(0x7f0000000640)={0x0, &(0x7f0000000600)}) r21 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r21) bind$inet6(r21, 0x0, 0x0) sendto$inet6(r21, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r21, 0x29, 0x8000000000000004, 0x0, 0x0) setsockopt$inet6_opts(r21, 0x29, 0x0, &(0x7f0000000080)=@fragment, 0x8) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r22 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EVIOCGKEYCODE_V2(r22, 0x80284504, &(0x7f0000000080)=""/33) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000100)=0x7) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') [ 195.571919] loop5: p1 < > p4 [ 195.578416] loop5: partition table partially beyond EOD, truncated [ 195.579308] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 195.603991] EXT4-fs: failed to create workqueue [ 195.608940] EXT4-fs (loop0): mount failed [ 195.614486] loop5: p1 size 2 extends beyond EOD, truncated [ 195.641511] loop5: p4 start 1854537728 is beyond EOD, truncated 16:37:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0xfe, 0x0, 0x80, 0x0, 0x7f, 0xa1800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0x8) fcntl$setstatus(r0, 0x4, 0x2000) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmctl$IPC_RMID(r1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x185}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="68000001", @ANYRES16=r2, @ANYBLOB="000129bd7000fedbdf25010000000000000007410000004c00180000000073797a3000"/98], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x40004040) r3 = shmat(r1, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmdt(0x0) shmdt(r3) memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x20a81) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0) r4 = creat(0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x36) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0xff34) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f0000000300), &(0x7f0000000340)=0xc) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) r6 = socket(0xa, 0x1, 0x0) close(r6) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="20000000000000008400000002000000000004000000000000000000cdefd5eb704ad620ec11026d516e4dda537c2e1848dd2ab6d3e62ff21fa18eb861166c367e8d95de5986e613b24c134cb4c67cc0b9112550af12ca0f", @ANYRES32=0x0], 0x20}], 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000180)={r8, 0x7}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000003c0)={r9, 0x11a}, 0x8) fallocate(r4, 0x0, 0xc000, 0x0) timer_create(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'team0\x00', 0x2}, 0x18) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r11, 0x4008ae6a, &(0x7f0000000040)) ioctl$KVM_IRQ_LINE(r11, 0x4008ae61, &(0x7f0000000000)={0x0, 0x10}) 16:37:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0xb, &(0x7f0000000000)=0x801, 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) sendmsg$tipc(r4, &(0x7f00000001c0)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e24}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f9e081d5f05c9548453b139f0d0c24db", 0x10}], 0x1, &(0x7f0000000180)="4ed5ba82", 0x4, 0x14080}, 0x40000) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 16:37:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x3c0}, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 16:37:54 executing program 3: mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x23) renameat(r0, &(0x7f00000001c0)='./file1\x00', r1, &(0x7f0000000180)='./file0/file0\x00') 16:37:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='\x00C\xb7N\x16-k\xa3\xed\x00', 0x420200, 0x0) ioctl$TCFLSH(r0, 0x80045438, 0x719000) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup(0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux\'policy\x00') r1 = gettid() tkill(r1, 0x1c) prlimit64(0x0, 0xc, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000003c0)="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", 0x398, 0xfd}, {0x0, 0x1107fb47db3903dd}]) dup(0xffffffffffffffff) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x106100, 0x0) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r7 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) [ 195.751926] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 195.784701] print_req_error: 34 callbacks suppressed [ 195.784706] print_req_error: I/O error, dev loop5, sector 0 [ 195.823705] print_req_error: I/O error, dev loop5, sector 0 [ 195.829461] buffer_io_error: 30 callbacks suppressed [ 195.829467] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.845532] print_req_error: I/O error, dev loop5, sector 0 [ 195.851523] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.862343] print_req_error: I/O error, dev loop5, sector 0 16:37:55 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x101000, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xf7d, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x2000000000000, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x10000101) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000000c0)=""/29) [ 195.868110] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.875819] print_req_error: I/O error, dev loop5, sector 0 [ 195.881897] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.882214] ubi0: attaching mtd0 [ 195.893304] print_req_error: I/O error, dev loop5, sector 0 [ 195.899023] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.907166] print_req_error: I/O error, dev loop5, sector 0 [ 195.913244] Buffer I/O error on dev loop5p1, logical block 0, async page read 16:37:55 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2f6465762f6e756c6c62300046725c6012ee375d54e0b2596dd07830b914d02eb75bfe1bdff97ac275cb63884eba7399f1217a2d2498cd0918ffb546f272be7db7a0de212ab58895d1ae8137f305e0a33da957bd36e55b1f06228bae6f8f51560a3074147a7bf7b6310662409335c7673bb1fd904d204e2a8b17ba8b1bc14025d3856e5b1499800541d86cb0f5a4b05fb88ae2b8e84b809d55ae9c8b895ead28bf1e3131741b98a29a7373265bc44d2ae97491d9e5671cb22b23596878d910ddfae2c6922f80bf4e31050032c8b7fc9235d1cd20bc62cdf7a12ca48ec957"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) lookup_dcookie(0xd168, 0x0, 0xfffffffffffffe63) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = creat(0x0, 0x0) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000000)={0x1, "c1f21739ab3e18a843664d10a54702ded54e329b8e8cf4535f68e87e64d209ab", 0x751d022c367dfc4f, 0xd3f2c241a1c87e1}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = socket(0x80008000000010, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x8000, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, &(0x7f00000005c0)) [ 195.917819] devpts: called with bogus options [ 195.920906] print_req_error: I/O error, dev loop5, sector 0 [ 195.930885] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.938478] print_req_error: I/O error, dev loop5, sector 0 [ 195.944264] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.951925] print_req_error: I/O error, dev loop5, sector 0 [ 195.957642] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 195.965462] Buffer I/O error on dev loop5p1, logical block 0, async page read 16:37:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) [ 196.018205] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 196.101017] Dev loop2: unable to read RDB block 2 [ 196.106038] loop2: unable to read partition table [ 196.111036] ubi0: attaching mtd0 [ 196.114640] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 196.145183] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 196.152008] loop2: partition table beyond EOD, truncated [ 196.190181] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 196.193142] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 16:37:55 executing program 1: openat$selinux_access(0xffffffffffffff9c, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x201e440, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006, 0x0, 0x0, 0x2}]}, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="d5", 0x1}, {&(0x7f0000000080)='L', 0x1}], 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r5, 0x0, 0x30005, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10040020}, 0xc, 0x0}, 0x4000000) chown(&(0x7f00000001c0)='./file0\x00', r0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400, 0x0) readlinkat(r6, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)=""/38, 0x26) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000140)) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000200)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) recvmmsg(r1, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000840)=""/218, 0xda}, {0x0}, {&(0x7f0000000a40)=""/161, 0xa1}, {&(0x7f0000000b00)=""/197, 0xc5}, {0x0}, {&(0x7f0000001c00)=""/144, 0x90}], 0x6}, 0x7}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000031c0)=""/163, 0xa3}}], 0x2, 0x2, &(0x7f0000003340)) [ 196.460896] audit: type=1804 audit(1571330275.665:92): pid=8353 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir613667403/syzkaller.6av9BI/43/bus" dev="sda1" ino=16696 res=1 [ 196.468915] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 16:37:55 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x101000, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xf7d, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x2000000000000, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x10000101) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000000c0)=""/29) [ 196.624686] devpts: called with bogus options 16:37:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="6bc35992c303171bcb47d8b68b7d7d99f6b4f252b825b74817ed6297aeee6c0cb791c9f8e6c97e789822f0ef0b83a9088537fef30dd0aa41d641d75aae03b9c0289041aa5edb81e7dada79118cc3b743669638b8b0f6a308407d207f515630b4b27fd6afb38d511bfe6737e933d01100322776e39eccff293148fd7a678fe43b59a86ce1c26b5b4d16167ba48515c9ce34439dfd4ec6d6a2ecfb5086f7c79b08da2b6848f948b299d0e7e833f779b94f85fedf6b16cd6969c488bed858106769b5cd2aab0310f3c8bacdbbd6d2d97abb388f3c269b54fa58ccd3891674001c6d533dfe58eaf7bf5ba5562aa27df9809da0fdc2b564d2df2165854cf1b265e1ad05ba0431a43430f3a34d2d622826505e6b087cf00645498c294cb21b3b82d7d771db1ae33fffcfd50f69323a636e48570315f1151589cd256301ebe13779dbee16dc6bb991d001083256eb757132e9c3e06b30212843a0b0030176eb00f7ede202922dac8089d7929939154791f44e048d7a6e92ca2d1737ec04acd8b1c72ed5e70de41abf1580a9ec3e9e403d48ec52e1d61b8beb713ebdacf617e241fa1fcb469d834ff34748d217c14fb5c007fe9751ada5e2478c25d55175dba8d15634d2139abca798ee98f6f37fa65d5d51830e152127e0ddb98e7f0966bf46ea51d71fec986d1bbb36de5451f5ddec91544f1abc6dbe3a71c14d57739825b507885c851c16cb9ed3522544ef70ae309c4703f3d632929db2adb71115f7845a209d14ef5f2893d7bf1d132c71020ec391d9c52717680b3eaeb7608e7df564a6730f1a0635817801c0330762eb2b4db99b230d1d08bd8318ef2b9ec84a38991c10fee9558739fdf4243f5f6cf7dcb702697e91e496f5e4e5d237d2ee80fcd0c336fd0006965673545b48a6af59ddf3b85c5bd0b40de501f1eb6a5656eac4984d44f70915e222817a666d5918982608a3a5f93d86627e553345974f88503740a10bf0bbb017275c597098a8233d895f0e79e25767fa897d5a749818ca3ef1f90dec418ddcb78102ea4c3806a495850b445bb3200c628996bbe192d9ca4fa17bd5b42c5c294624b6b883235b1d3f5bcc1c2ec1d7e284fc81e16c3cbbe9ccad48064003b1b9c000dd96ada67572dfd1cd57339b584c7f9c4f2f2bb975df00fb1883c3ad46196415c1f5356d1205e4a798e1a0f3acbb03f737ddd49f546ce8371d001e7cd112d80dee274c201e4116779ac142615c545e032a03396ecc88b8aaf7f384405502bfb0d923e4a20de157b23633327e55041c876c88de296e0ab044bf2b323749e690789f93c2ec7289add63a0a7f2ebaea801344a9be061d5c1a0e11099b93db40198f2ad5bd1c29e9c1657fd1955af5492b85ba278687cf9527e96111d5a7b83f75dea43c70f4410408dd313755d8936eb2d20ced5c8bf6b39bac674d3e7b7e66a9e6d889022965f08c9f563cddb3c4aed6ec07fd45a8f8ad931a049d736394ea7c40a41ad00532af69720aa558c312c6dae8e1bb503b257ed99e18b7a90bbb44e5ecb70a650a0dc7d5dde8a9d713c80287235032b683c5859e095c9f69fc79c9d1cf950a2ff9e443dc9668b9482270a7446baba0d4033134389ad1bb5f5650bc7df1dbe9214c9b3e8bc76d88cc4a676c6acbef87da44308bd6bc59aa434d858a8594882cbce58c5a35fdfd5a4f3f5552a313908fbe60b4bcc246f24a08698341237e0769e91d721539d2107a872c777135fd74fc0d8f0ba9e59129b5cf96608ba09eda15702d3628731ba2bd6ca65bc62576cf8fa7c74b2cc9a12a76", 0x4fc, 0x83, 0x0, 0x5}]) [ 196.649053] ubi0: attaching mtd0 [ 196.652757] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 196.702854] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 196.770981] Dev loop2: unable to read RDB block 2 [ 196.776061] loop2: unable to read partition table [ 196.813331] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 196.843184] loop2: partition table beyond EOD, truncated 16:37:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) [ 196.853389] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 196.870176] protocol 88fb is buggy, dev hsr_slave_0 [ 196.875257] protocol 88fb is buggy, dev hsr_slave_1 16:37:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) [ 196.925218] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 197.110132] protocol 88fb is buggy, dev hsr_slave_0 [ 197.115263] protocol 88fb is buggy, dev hsr_slave_1 [ 197.136863] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. 16:37:56 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000440)={0x2, @win={{}, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0}}) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000000)={0x9, [0x0, 0x8, 0x6c, 0x0, 0x1ff, 0x4000, 0x5, 0x81, 0x5, 0x3, 0x6, 0x5, 0x3, 0x800, 0x3a4a, 0x8921, 0x9, 0x5, 0x1f, 0x2, 0x332, 0xfff9, 0x1ff, 0x401, 0xff, 0x7f, 0x40, 0x20, 0x3, 0x8, 0x1, 0x0, 0x7ff, 0x2, 0x101, 0x2, 0x200, 0x2, 0xc7, 0x0, 0x32d6, 0x1, 0x5, 0x7fff, 0x8, 0x0, 0x20, 0xe693], 0x2}) 16:37:56 executing program 2: socket$nl_route(0x10, 0x3, 0x0) getpid() capget(0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) r1 = syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x8f) r2 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000080)={0x460a73d1e3a77463, 0xfff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0x20) r4 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r4, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200500}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB='l\b\x00\x00', @ANYRES16=r1, @ANYBLOB="00042dbd7000fbdbdf25030000000c00090008000100ff0000002c00020008000100ff01000008000100ffffffff0400040008000200040000000400040004000400040004"], 0x3}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, 0x0) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)={0x60, r1, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe250}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x100}, 0x0) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) 16:37:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x21}, {0x0, 0x200}, {}, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) write(r0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000000)={0x3, 0x5, 0x1ff}) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) 16:37:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) 16:37:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="6bc35992c303171bcb47d8b68b7d7d99f6b4f252b825b74817ed6297aeee6c0cb791c9f8e6c97e789822f0ef0b83a9088537fef30dd0aa41d641d75aae03b9c0289041aa5edb81e7dada79118cc3b743669638b8b0f6a308407d207f515630b4b27fd6afb38d511bfe6737e933d01100322776e39eccff293148fd7a678fe43b59a86ce1c26b5b4d16167ba48515c9ce34439dfd4ec6d6a2ecfb5086f7c79b08da2b6848f948b299d0e7e833f779b94f85fedf6b16cd6969c488bed858106769b5cd2aab0310f3c8bacdbbd6d2d97abb388f3c269b54fa58ccd3891674001c6d533dfe58eaf7bf5ba5562aa27df9809da0fdc2b564d2df2165854cf1b265e1ad05ba0431a43430f3a34d2d622826505e6b087cf00645498c294cb21b3b82d7d771db1ae33fffcfd50f69323a636e48570315f1151589cd256301ebe13779dbee16dc6bb991d001083256eb757132e9c3e06b30212843a0b0030176eb00f7ede202922dac8089d7929939154791f44e048d7a6e92ca2d1737ec04acd8b1c72ed5e70de41abf1580a9ec3e9e403d48ec52e1d61b8beb713ebdacf617e241fa1fcb469d834ff34748d217c14fb5c007fe9751ada5e2478c25d55175dba8d15634d2139abca798ee98f6f37fa65d5d51830e152127e0ddb98e7f0966bf46ea51d71fec986d1bbb36de5451f5ddec91544f1abc6dbe3a71c14d57739825b507885c851c16cb9ed3522544ef70ae309c4703f3d632929db2adb71115f7845a209d14ef5f2893d7bf1d132c71020ec391d9c52717680b3eaeb7608e7df564a6730f1a0635817801c0330762eb2b4db99b230d1d08bd8318ef2b9ec84a38991c10fee9558739fdf4243f5f6cf7dcb702697e91e496f5e4e5d237d2ee80fcd0c336fd0006965673545b48a6af59ddf3b85c5bd0b40de501f1eb6a5656eac4984d44f70915e222817a666d5918982608a3a5f93d86627e553345974f88503740a10bf0bbb017275c597098a8233d895f0e79e25767fa897d5a749818ca3ef1f90dec418ddcb78102ea4c3806a495850b445bb3200c628996bbe192d9ca4fa17bd5b42c5c294624b6b883235b1d3f5bcc1c2ec1d7e284fc81e16c3cbbe9ccad48064003b1b9c000dd96ada67572dfd1cd57339b584c7f9c4f2f2bb975df00fb1883c3ad46196415c1f5356d1205e4a798e1a0f3acbb03f737ddd49f546ce8371d001e7cd112d80dee274c201e4116779ac142615c545e032a03396ecc88b8aaf7f384405502bfb0d923e4a20de157b23633327e55041c876c88de296e0ab044bf2b323749e690789f93c2ec7289add63a0a7f2ebaea801344a9be061d5c1a0e11099b93db40198f2ad5bd1c29e9c1657fd1955af5492b85ba278687cf9527e96111d5a7b83f75dea43c70f4410408dd313755d8936eb2d20ced5c8bf6b39bac674d3e7b7e66a9e6d889022965f08c9f563cddb3c4aed6ec07fd45a8f8ad931a049d736394ea7c40a41ad00532af69720aa558c312c6dae8e1bb503b257ed99e18b7a90bbb44e5ecb70a650a0dc7d5dde8a9d713c80287235032b683c5859e095c9f69fc79c9d1cf950a2ff9e443dc9668b9482270a7446baba0d4033134389ad1bb5f5650bc7df1dbe9214c9b3e8bc76d88cc4a676c6acbef87da44308bd6bc59aa434d858a8594882cbce58c5a35fdfd5a4f3f5552a313908fbe60b4bcc246f24a08698341237e0769e91d721539d2107a872c777135fd74fc0d8f0ba9e59129b5cf96608ba09eda15702d3628731ba2bd6ca65bc62576cf8fa7c74b2cc9a12a76", 0x4fc, 0x83, 0x0, 0x5}]) 16:37:56 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x4000, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000440)={'security\x00', 0x2b, "1557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca2"}, &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f747970e5766d6e65743174727573746564202f7b23406d64f3c5198e5d9e09d87f1bc5113573756d5e08643573756d20245b29266b657972696e67736563757269747976626f786e0274316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72c1b4e8135550c6ccc410b00193786a0b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e3e000000db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd3e858973998fae94a65d92cd5f590224dc15567f9bea72118123a2c4b666eb63d688c919275115735528c4ecdb405ae597ec8c09675ef993d9a60797f0981d2150fe6dc2d895ae40001bac683e39cc8b83f81d723027dffbb4793952725b2e695d194868d5ac6b7235f85639518b51f5d59dd0080023f785ce8688e0a696f37e8f6007749c3a3938eeea11cca554f6f2ce9735adda2be082f971fbea36754f8073bc5f1ce6bd63c34b08add7ee3a03105bc52175d412e3a30ea031190335fd7ba8ef00"/423], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000380)=0x9) syz_open_dev$midi(0x0, 0x9e7a, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0x10254, 0x0, 0x1, 0x0, 0x0, 0x4040102}, 0x20000000) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x200008}, 0x2}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r9 = syz_open_dev$dri(0x0, 0x0, 0x0) r10 = dup3(r9, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r10, 0x641e) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r11, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() [ 197.510142] protocol 88fb is buggy, dev hsr_slave_0 [ 197.515231] protocol 88fb is buggy, dev hsr_slave_1 16:37:56 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x10000000) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000700)) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000280)) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030303030303030303030346532322c74696d656f75743d3078303030303030303030303030303430302c6163636573733d757365722c72713d3078303030303030303030303030303033312c61ffff7b3d3078303030303030303030303030303030322c6673636f6e746578743d73797374656d5f752c61707072616973652c6f626a5f726f6c653d6e65742f756470002c0000400000", @ANYRESDEC=0x0, @ANYBLOB="19bc16d0dc425728227a29cd625ead02e454e0b19872be1cf3eb4cbd4555cdcafd678d6319d31019f327ec9b7beb665af0f3475f66c7fa7cc383015ed60aea959490b817cc7fa97cdf6fa253f86e49246533101038e0deac130a5078c3a28983ac8ee45fb7ef216177bcc1319ba5dc62cd5e982332c1e4fafbdc830b552bf05adcc1e5fe7d701e2b4ebe924d21ff37050a9830773804b6139f699a1923ef06629e0b2c7bc17079379834f2cfdd"]) dup(r0) r1 = socket$inet6(0xa, 0x80003, 0x9) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000000000), 0x4) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 197.568611] ubi0: attaching mtd0 [ 197.573492] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 197.670129] protocol 88fb is buggy, dev hsr_slave_0 [ 197.675253] protocol 88fb is buggy, dev hsr_slave_1 16:37:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() tgkill(r5, r5, 0x0) r6 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r6, 0x0, r4) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r10, 0x0) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, 0xffffffffffffffff, &(0x7f00000000c0)="526959f32c1efa5d459e4fea48ec3b5036f481c88fc185ef2ffbbbc886b62cbc6ed0eefd8c4d6d2abebfe77a7cb8259b5a3e2727", 0x34, 0x1}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r10, &(0x7f0000000880)="6bc35992c303171bcb47d8b68b7d7d99f6b4f252b825b74817ed6297aeee6c0cb791c9f8e6c97e789822f0ef0b83a9088537fef30dd0aa41d641d75aae03b9c0289041aa5edb81e7dada79118cc3b743669638b8b0f6a308407d207f515630b4b27fd6afb38d511bfe6737e933d01100322776e39eccff293148fd7a678fe43b59a86ce1c26b5b4d16167ba48515c9ce34439dfd4ec6d6a2ecfb5086f7c79b08da2b6848f948b299d0e7e833f779b94f85fedf6b16cd6969c488bed858106769b5cd2aab0310f3c8bacdbbd6d2d97abb388f3c269b54fa58ccd3891674001c6d533dfe58eaf7bf5ba5562aa27df9809da0fdc2b564d2df2165854cf1b265e1ad05ba0431a43430f3a34d2d622826505e6b087cf00645498c294cb21b3b82d7d771db1ae33fffcfd50f69323a636e48570315f1151589cd256301ebe13779dbee16dc6bb991d001083256eb757132e9c3e06b30212843a0b0030176eb00f7ede202922dac8089d7929939154791f44e048d7a6e92ca2d1737ec04acd8b1c72ed5e70de41abf1580a9ec3e9e403d48ec52e1d61b8beb713ebdacf617e241fa1fcb469d834ff34748d217c14fb5c007fe9751ada5e2478c25d55175dba8d15634d2139abca798ee98f6f37fa65d5d51830e152127e0ddb98e7f0966bf46ea51d71fec986d1bbb36de5451f5ddec91544f1abc6dbe3a71c14d57739825b507885c851c16cb9ed3522544ef70ae309c4703f3d632929db2adb71115f7845a209d14ef5f2893d7bf1d132c71020ec391d9c52717680b3eaeb7608e7df564a6730f1a0635817801c0330762eb2b4db99b230d1d08bd8318ef2b9ec84a38991c10fee9558739fdf4243f5f6cf7dcb702697e91e496f5e4e5d237d2ee80fcd0c336fd0006965673545b48a6af59ddf3b85c5bd0b40de501f1eb6a5656eac4984d44f70915e222817a666d5918982608a3a5f93d86627e553345974f88503740a10bf0bbb017275c597098a8233d895f0e79e25767fa897d5a749818ca3ef1f90dec418ddcb78102ea4c3806a495850b445bb3200c628996bbe192d9ca4fa17bd5b42c5c294624b6b883235b1d3f5bcc1c2ec1d7e284fc81e16c3cbbe9ccad48064003b1b9c000dd96ada67572dfd1cd57339b584c7f9c4f2f2bb975df00fb1883c3ad46196415c1f5356d1205e4a798e1a0f3acbb03f737ddd49f546ce8371d001e7cd112d80dee274c201e4116779ac142615c545e032a03396ecc88b8aaf7f384405502bfb0d923e4a20de157b23633327e55041c876c88de296e0ab044bf2b323749e690789f93c2ec7289add63a0a7f2ebaea801344a9be061d5c1a0e11099b93db40198f2ad5bd1c29e9c1657fd1955af5492b85ba278687cf9527e96111d5a7b83f75dea43c70f4410408dd313755d8936eb2d20ced5c8bf6b39bac674d3e7b7e66a9e6d889022965f08c9f563cddb3c4aed6ec07fd45a8f8ad931a049d736394ea7c40a41ad00532af69720aa558c312c6dae8e1bb503b257ed99e18b7a90bbb44e5ecb70a650a0dc7d5dde8a9d713c80287235032b683c5859e095c9f69fc79c9d1cf950a2ff9e443dc9668b9482270a7446baba0d4033134389ad1bb5f5650bc7df1dbe9214c9b3e8bc76d88cc4a676c6acbef87da44308bd6bc59aa434d858a8594882cbce58c5a35fdfd5a4f3f5552a313908fbe60b4bcc246f24a08698341237e0769e91d721539d2107a872c777135fd74fc0d8f0ba9e59129b5cf96608ba09eda15702d3628731ba2bd6ca65bc62576cf8fa7c74b2cc9a12a76", 0x4fc, 0x83, 0x0, 0x5}]) 16:37:57 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x801, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000140)=0xff, 0x8) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) ftruncate(r0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000040)={{0x2, 0x4e22, @local}, {0x6, @remote}, 0x4, {0x2, 0x4e22, @broadcast}, 'bond_slave_0\x00'}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) ioctl$TIOCMBIC(r6, 0x5417, &(0x7f0000000180)=0x10000) dup2(r5, r3) r7 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 197.990112] protocol 88fb is buggy, dev hsr_slave_0 [ 197.995302] protocol 88fb is buggy, dev hsr_slave_1 [ 198.072208] overlayfs: filesystem on './file0' not supported as upperdir 16:37:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r3}}, 0x171) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000080)={0x6, 0x118, 0xfa00, {{0x4, 0x1, "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", 0x55, 0x20, 0x2, 0x9, 0x20, 0x6c, 0xe8, 0x1}, r3}}, 0x120) prctl$PR_GET_DUMPABLE(0x3) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) ioctl$TUNSETOWNER(r4, 0x400454cc, r5) 16:37:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sched_setattr(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x1, 0x1, 0x1, 0x1, 0xa6da, 0x3f, 0x7fff}, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="a4ab12f728db4b2b4d2f2fba4fad0b3a47dce7d4f2c87fe118f1783de356bf6ab4d6122343163f70cc88c691881eb4ec622b7646efbc299395e60de0b52284f81d5decb7ad3afd6de195460f163f44bf859d13632532dd71fea8cc5615b5f1be61e4e568443ff05ce3a70d0495cbc33186aef00c2fe7ffbf250a9ab1af4585ba70d2f7a697de30ae3b5f", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 16:37:57 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) shutdown(r0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x50, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000100)={@empty}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000180)=""/42) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r3, 0x0, &(0x7f0000000040)) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x500, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000340)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00005a6ff0)={&(0x7f0000000000)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, {@in=@remote}, @in, {}, {0x0, 0x0, 0x0, 0x3f}}}, 0xf0}}, 0x2000) 16:37:57 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x2, &(0x7f0000001fd8)=@raw=[@call={0x85, 0x0, 0x0, 0x1b}, @generic={0x7, 0xd, 0x9, 0x6659, 0x7}], &(0x7f0000000340)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000100)=0x6) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29050, 0x0, 0x0, 0xab1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000840)='cpuset.effective_mems\x00o\x90\x99\x05\x05\x98\xd4t\xbf\x02\xfd\x89z\x1b\xba\x9a\xc1\x9b/\xeb\x96-\x87\x98\x89eo\xd6=\xe5Z\xc6\xe9\x83G\xdc\xc9v>\xcd\xe1\x1ca\xe5f\xd4Q\xe7\x84w3\xfdh\x05\x06\xc3\xe7\xcd\v\xe9\'\xc7-+\xb8\xa4\xac\xe0\x17\xf3\x15\xe0\xfb\x8e#\x1b|\xde\x0f\x94\x1c\x18\x15^\xb0\n\xf0\x04\xbe\xbb\x8c\xd6!\xe8_\xcaK5N<\xe7\xf4\x1dQ\x0e_\xb9\xa5\x01\x8c\x99\x010\x13\xfd\b\x01\xb9v\xca\x87\xf0\xc4*\x06P\xd4\"\xdf\x81\xfa\x83i^\xe3\x8b\xf5\xd4+5h\xcbv\x00 \t\x85\xeb\tf\xfc\x81#\xefr(\x8dX\x962N/\x93', 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x5000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r4, &(0x7f0000000440)='threaded\x00', 0x38b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000480)=ANY=[]) gettid() ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000280)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000380)=0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000480)={'filter\x00'}, &(0x7f0000000140)=0x78) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 16:37:57 executing program 1: pipe(&(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB="edffffffffffffff08000a00", @ANYRES32=r5], 0x28}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x15, r5, 0x1, 0x80}, 0x14) getdents64(r2, &(0x7f0000000140)=""/4096, 0x1000) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001140)=@gcm_256={{0x303}, "e362d7a04d5612ed", "cbc923c31417e12bfd1e6f94f11e94bcef1175f4cfe071d1abe3b7c8737cdca6", "019962e3", "bd4fd25122f704c1"}, 0x38) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) syz_open_procfs(0x0, 0x0) fallocate(r1, 0x3, 0x0, 0x0) 16:37:57 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, 0x0, 0x0) close(0xffffffffffffffff) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1, 0x2, 0x80, &(0x7f0000ffc000/0x3000)=nil, 0xd3}) 16:37:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4000000043) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000040)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0xfffffffffffffec9) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x18, 0x0, 0x0, 0x0, 0x5}, 0x98) 16:37:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="5800000000000000140100000700000080000000f7ffffff", @ANYPTR=&(0x7f0000000040)=ANY=[], @ANYPTR, @ANYBLOB="06000000000000000101000000000000090000000000000000000300000000025400000014000000ff00000000000000"], 0x58}, 0x0) socket(0x0, 0x0, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000080)={0xa, 0x2, 0x8, 0x18a, '\x00', 0x8}) 16:37:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) dup(r0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)={[{0x2b, 'pids'}, {0x2b, 'io'}, {0x2b, 'io'}, {0x2b, 'memory'}, {0x2b, 'io'}, {0x2b, 'pids'}, {0x2b, 'rdma'}, {0x2b, 'io'}]}, 0x2a) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f00000000c0)) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008070000", @ANYRES32=r6], 0x30}}, 0x0) 16:37:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x4, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfd77e4ef05f7e1, 0x0, 0x0, 0x35a) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x80, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/route\x00') prctl$PR_SET_SECUREBITS(0x1c, 0xf) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000016c0)={0x5, 0x70, 0x20, 0x9, 0x5, 0xfb, 0x0, 0x7, 0x20120, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x6, @perf_bp={&(0x7f0000001680), 0x1}, 0x20, 0x5, 0x8, 0x5, 0x4, 0x0, 0x2000}, 0x0, 0x8, 0xffffffffffffffff, 0x5c34e819c1f2d2e8) flistxattr(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1f, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') preadv(r2, &(0x7f00000017c0), 0x1a0, 0xf0ffff) [ 198.874560] atomic_op ffff888094e8b3c0 conn xmit_atomic (null) [ 198.914606] ubi0: attaching mtd0 [ 198.918378] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:37:58 executing program 1: semget(0x0, 0x4, 0x200) r0 = semget(0x3, 0x1, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000180)) semop(r0, &(0x7f0000000000)=[{0x3, 0x101, 0x400}, {0x0, 0x8085}, {0x2, 0x4, 0x800}, {0x0, 0x9, 0x800}, {0xe, 0x101, 0x400}], 0x5) semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, &(0x7f00000000c0)) 16:37:58 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x7, 0x402880) waitid$P_PIDFD(0x3, r2, &(0x7f0000000440), 0x2, &(0x7f0000000580)) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) vmsplice(r1, &(0x7f0000000540)=[{0x0}, {0x0}], 0x2, 0x6) syz_open_dev$sndmidi(0x0, 0x0, 0x701101) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000004c0)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000500)) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x113) readv(r0, &(0x7f0000000540)=[{0x0}], 0x1) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) modify_ldt$write(0x1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000040)) 16:37:58 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026}, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) keyctl$read(0xb, r0, &(0x7f0000000d80)=""/4096, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x510, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0x2, 0x81}, {0x7f, 0x0, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) openat$ion(0xffffffffffffff9c, 0xffffffffffffffff, 0x100, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x17, &(0x7f0000000100), 0x0) [ 198.996211] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 199.009732] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 199.034131] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 199.368470] overlayfs: './file0' not a directory 16:38:00 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) write$P9_RWRITE(r1, &(0x7f0000000080)={0xb, 0x77, 0x2, 0xfffffff9}, 0xb) unshare(0x400) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="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"]) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000003c0)=""/180) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)=0x8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, 0x0, 0x0) write(r5, &(0x7f0000000600)="b990d45aa9b60e1cdd4b6f162dad3fe0906db244730f20fbf9c671f5e80cdff461d1553c4e41af50f35637ef9bb5a263f86727739d7851d5c17eeed5cd506e5eb83a127de8d38c8376a9233fa7dd535724b015538e23998afefbc36b231291910421d29c5cc1ed28157df5db62225ca8ea51a350aea3cbd62e5a2efcce8a24dc7d32ac91f3181d5cabb50fd163b10087825e605bc800f60d4e81fc8c41d6907f2fa52f8fa8", 0x3b4) 16:38:00 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026}, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) keyctl$read(0xb, r0, &(0x7f0000000d80)=""/4096, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x510, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0x2, 0x81}, {0x7f, 0x0, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) openat$ion(0xffffffffffffff9c, 0xffffffffffffffff, 0x100, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x17, &(0x7f0000000100), 0x0) 16:38:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) mlock2(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r1, r2, 0x0, 0x1) 16:38:00 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x40280, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\a\x00\x00\x00', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x9, 0x4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x1a001000090}, [@ldst]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 16:38:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:38:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000300)={0xffffffc6, 0x0, [], {0x0, @reserved}}) r2 = dup2(r1, r0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="8c0000002d00000226bd7000fddbdf25120000000c00870005000000000000004f6d6b6c949a33f431bd8617432aaaf2980a235a1e202af9b70bea2296ab9486f2afe0d165c1c71ae3be39d57dfed9418b2a5cddacdf8278fd07eb685ffef773097b07fd03c372455985fd3ebcb2f8f0a0e2bff60f91304c4f7b293432593565d91dcd312c58355a0cce9c00"], 0x8c}, 0x1, 0x0, 0x0, 0x2000004}, 0xa000000) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f00000002c0)=0xfffffff7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000000)=0x0) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(r7, 0x7ffffc, 0x0) write$binfmt_aout(r5, &(0x7f0000000640), 0x20) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r7, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fcntl$setstatus(r5, 0x4, 0x44800) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x4000}]) 16:38:00 executing program 0: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = getpid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x624000, 0x0) fcntl$getown(r1, 0x9) rt_tgsigqueueinfo(r0, 0x0, 0x35, &(0x7f00000001c0)={0x0, 0x0, 0x6}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000880)={0x4, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x4, 0x0}}}, 0x5acc64775f76caf, 0x4, [{{0x2, 0x4e20, @rand_addr=0xfffff3c1}}, {{0x2, 0x4e24, @remote}}, {{0x2, 0x0, @rand_addr=0x1f}}, {{0x2, 0x0, @broadcast}}]}, 0x290) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="400000000000000008001b000000"], 0x30}}, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, r3, 0x100000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f00000000c0)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/ipv6_route\x00') bind$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x7, 0x0, 0x1, 0xff, 0x6, @random="b8907e27a47c"}, 0x14) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) r5 = getgid() stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./bus\x00', 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), 0x0) stat(&(0x7f00000004c0)='./bus\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) setgroups(0x8, &(0x7f00000005c0)=[r5, r6, 0x0, 0x0, 0x0, r7, 0x0, r8]) ioctl$int_out(r4, 0x0, &(0x7f0000000500)) 16:38:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/\x8c\x00', 0x0, 0x0) unshare(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x2b2) sysinfo(&(0x7f0000000000)=""/50) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@null=' \x00', 0xe, 'ip6tnl0\x00'}) 16:38:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x16) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="e54e000000000000000008000000180004001400010062726f6164634273742d6c696e6b00"], 0x3}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)={0x15c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x84d}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x4, 0x1, 0x1f4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @mcast2, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @remote, 0x8072}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x971}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8, @remote, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x46bf}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6c}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x444}, 0x80) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x41, &(0x7f0000000180)=0x804, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) vmsplice(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000540)="07332dddc13e9928dbc3c2e194f4612185b3759b732073a8042e169f66abeb7bd884d984fa158df07801dfcd0519d83f548103d56e5c4ae29ee82af5aebe536a6968636fba5b2a845945c34d8929d59e5aa9649fb24f708211d36226a00fee65bf10a4cb5b2ba10b0c061159c3b9b531e4f6c5579861f481ed9aae949a45bdd8db84d97e8c4cfb4e47bad4fd3565146be3c28fbe202d99ef73e4bf4d9577496c892482919fca374f92a5876e6d5228db20a539cd2c67794dc6ae7311696ec8e952d8d32a4a83dd363a9a5807caf438bbe81bdd", 0xfffffffffffffe76}], 0x1, 0xc) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000240)={0xa00000, 0x0, 0x9, [], 0x0}) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') sendfile(r8, r7, 0x0, 0x800) setsockopt$packet_buf(r8, 0x107, 0x16, &(0x7f00000000c0)="bb0b2cc5de78572d10abe90e2b12c76e207d7f88ce0e096446b42ecc7b2fb030071d1cd1a677c6cd0c92", 0xc286a883a8c7ffea) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r9 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r9, 0x8937, &(0x7f0000000180)={'veth0_to_hsr\x00', @ifru_settings={0x10001, 0x0, @fr_pvc=0x0}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) r11 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r11, 0x8937, &(0x7f0000000180)={'veth0_to_hsr\x00', @ifru_settings={0x2, 0x0, @fr_pvc=0x0}}) r12 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r12, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r13 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r13, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000900)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES64=r9], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYPTR, @ANYPTR, @ANYRESHEX=0x0, @ANYRESDEC=0x0, @ANYPTR64, @ANYRES64=r12, @ANYRES16=0x0], @ANYPTR64=&(0x7f00000007c0)=ANY=[@ANYRES16, @ANYRES16=r0, @ANYRES32=r13, @ANYRES64, @ANYBLOB="bb99ddfed42ebcd328506e9d0cd2782421c28ffbf6ea9920e8e9b1336997938f6a63a61d947ebbd4ca01c7e87b133776c9e75620480ac3bcc58b1053ab01208fbc1112351ca77e6d035f61c07b5f501f7a851875f99775560c62627c64dd53624aff50551eaaee305ab72afc6b940a2d8e560672dd6e57c06d1780822831da6360dc0e418ed841bf206c5531d644a5adf85a2bade0560b9f75f5"], @ANYRESDEC=0x0]], 0x2}, 0x1, 0x0, 0x0, 0x4001840}, 0x8000) write$binfmt_misc(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="73797a305fae8724cac4ae5ee915162a1f342c075ff48185ae046685a5526c3a96680b47ae99c34e9f6a22a5eba7eac15891b942dec410089980a1f300006e41abf82aff9a3b4ea20e0d7e3e2ee36aa726b0336cbffedc5a71b479eb5b74cee763795874e5e9104fed8a24"], 0x6b) syz_open_dev$sndctrl(0x0, 0x0, 0x0) 16:38:00 executing program 2: socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000100)=""/17, 0xfffffd29, 0x7) r0 = memfd_create(&(0x7f0000000180)='\x03\xb9\x11\x9e\'\xab\x05\xae\xa5\x17\xe4\x93\xafu', 0x0) r1 = dup(r0) clone(0x208100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f0000000140), 0x0, 0x1000) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000040)={0x3ee8, 0x5, 0x9, 0x8}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) [ 201.396557] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 16:38:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0xc2542, 0x0) write$P9_RSTATu(r1, &(0x7f00000002c0)={0x11e, 0x7d, 0x0, {{0x500, 0xff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '(nodevselfwmd5sum[vboxnet0ppp0%', 0x51, '.\x00\x00\x00\x00\x00USp\x05\x06K|UR4A\xe7\xad&\xef\x89~(\xcd\x12\x15\xc9\xe73\xd1L\xdc\xf0\x1a\xd6\x9c\xfc\x96\xf9\xf8\xd8{\x02-\x19\x88Q\xb2\x95f\xe4\x80\xa0\x95;\x9d\\\x83\xe8\xee\xb3\x91\x99kka*\x00\x954\xd1\x136\xcaB\xdf\xfc\xbf\xc3\xe5', 0xb, 'cgroupppp1(', 0x51, '.\x00\x00\x00\x00\x00USp\x05\x06K|UR4A\xe7\xad&\xef\x89~(\xcd\x12\x15\xc9\xe73\xd1L\xdc\xf0\x1a\xd6\x9c\xfc\x96\xf9\xf8\xd8{\x02-\x19\x88Q\xb2\x95f\xe4\x80\xa0\x95;\x9d\\\x83\xe8\xee\xb3\x91\x99kka*\x00\x954\xd1\x136\xcaB\xdf\xfc\xbf\xc3\xe5'}, 0xa, '/dev/nbd#\x00'}}, 0x11e) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r3}}, 0x171) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000080)={0x15, 0x110, 0xfa00, {r3, 0x9, 0x0, 0x0, 0x0, @ib={0x1b, 0x81, 0x200, {"cf461e16a79231ddde90ed6046f63c97"}, 0xfffffffffffffff8, 0x4, 0x4c}, @in6={0xa, 0x4e23, 0x2, @mcast2, 0x80000000}}}, 0x118) 16:38:00 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026}, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) keyctl$read(0xb, r0, &(0x7f0000000d80)=""/4096, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x510, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0x2, 0x81}, {0x7f, 0x0, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) openat$ion(0xffffffffffffff9c, 0xffffffffffffffff, 0x100, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x17, &(0x7f0000000100), 0x0) [ 201.574194] IPVS: ftp: loaded support on port[0] = 21 [ 201.584665] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.591931] bridge0: port 1(bridge_slave_0) entered disabled state 16:38:00 executing program 1: socket$nl_route(0x10, 0x3, 0x0) getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026}, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) keyctl$read(0xb, r0, &(0x7f0000000d80)=""/4096, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x510, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff}, {0x2, 0x81}, {0x7f, 0x0, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x5, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = syz_open_dev$vivid(0x0, 0x0, 0x2) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000280)={0x0, @raw_data="e2c07d6cf34bf7373565792741030de9a1e6aed734cf96219aef2e7161b85c9bcef026dd8b9ed964f27968e1ae04e4d670f21d37430ba4a233cb3210be29d673e331782805750fb60d88599cb98b2fdfb5c8d37b2d44b2670d24b2cff3eeb345da7557447501fd0b92c09a9f1dda3cf986ccfdc0c44cd457c286c7d9e167854fe4c2da327c794b44d6d17d0b6d6a14ba1d6ad70966091586e5db2b4c3f4f50e18fabe3d3a5eda11b4052545e8ed7aecc0acc3e9a6bdd565d51eed7bab197e5747bdc554a61b0dacc"}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f00000003c0)={0x0, 0x7fffffff}) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) openat$ion(0xffffffffffffff9c, 0xffffffffffffffff, 0x100, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x17, &(0x7f0000000100), 0x0) [ 201.788409] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 16:38:01 executing program 1: statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/86) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8}]}}}]}, 0x3c}}, 0x0) [ 202.025721] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.035482] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.049934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.063496] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 202.069704] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.095698] net_ratelimit: 22 callbacks suppressed [ 202.095711] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 202.125173] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 16:38:01 executing program 4: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000010000000c00000009", 0x15, 0x1400}], 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10d340, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x1) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000002c0)=""/14) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000140)={0xa20000, 0x5ed876f4, 0x5, [], &(0x7f0000000100)={0x98091e, 0x4, [], @value=0x5}}) [ 202.150117] protocol 88fb is buggy, dev hsr_slave_0 [ 202.155293] protocol 88fb is buggy, dev hsr_slave_1 [ 202.167036] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 202.179374] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 202.188295] F2FS-fs (loop4): Invalid log sectors per block(1) log sectorsize(9) [ 202.196490] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 202.204311] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 202.219522] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 202.229755] audit: type=1400 audit(1571330281.435:93): avc: denied { write } for pid=8614 comm="syz-executor.4" name="net" dev="proc" ino=32923 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 202.260174] F2FS-fs (loop4): Invalid log sectors per block(1) log sectorsize(9) [ 202.276149] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 16:38:01 executing program 3: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4620}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x14480, 0x0) connect$x25(r1, &(0x7f0000000240)={0x9, @remote={[], 0x0}}, 0x12) r2 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f00000012c0)="03", 0x1, 0x9, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r4, 0x8905, &(0x7f00000008c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setresuid(r2, r3, r5) listen(r0, 0xffeffffefffffffb) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_emit_ethernet(0xffc4, &(0x7f0000000280)={@dev={[], 0x19}, @random="192bce5e2dfb", [], {@llc_tr={0x11, {@snap={0x1, 0xff, "ab85", "4cfb0b", 0x601d, "4b5d7ed484245a40c5037329963fcf0f06a6f187eeec7ed424e12c4b120c7536d2fa2ac5913e7f28514d257c2bc8112fe0a8d2482bb6e63660654f85b3e37a90e43e05445727a950fd0f9c8910eff809b4445c795c204492fd0023a112615c0cb554"}}}}}, 0x0) [ 202.287028] audit: type=1400 audit(1571330281.465:94): avc: denied { add_name } for pid=8614 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 202.315254] audit: type=1400 audit(1571330281.465:95): avc: denied { create } for pid=8614 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 16:38:01 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,Vorkdir=./file1']) chdir(&(0x7f0000000180)='./file0\x00') stat(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) stat(&(0x7f0000000040)='./file1/file0\x00', 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 16:38:01 executing program 4: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000080)={0x100, 0x200, 0x1f, 0x8, 0x0, 0x4ce7, 0x100}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'veth0_to_bond\x00', &(0x7f0000000000)=@ethtool_stats}) [ 202.370547] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 202.390148] protocol 88fb is buggy, dev hsr_slave_0 [ 202.395266] protocol 88fb is buggy, dev hsr_slave_1 [ 202.402611] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 202.452883] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 202.467567] overlayfs: unrecognized mount option "Vorkdir=./file1" or missing value [ 202.497129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 202.523988] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 202.543475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.550873] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 202.557131] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.567001] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 16:38:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r9, 0x0) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r10, 0x4c80, 0x0) r11 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, r10, &(0x7f0000000140)="526959f32c1efa5d459e4feaec3bc88fc185ef2ffbbbde86b62cbc6ed0eefd8c4d6d2abebf5359fe70c86cd59e272769d47c733976aece6f6b351af71a00000000", 0x41, 0x1, 0x0, 0x0, r11}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r9, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) [ 202.599395] overlayfs: unrecognized mount option "Vorkdir=./file1" or missing value 16:38:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0x8000a0ffffffff, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100}, 0x28) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 16:38:01 executing program 2: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000007000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r0, &(0x7f0000eb8000)) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) 16:38:01 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x100000000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000200)={{0x7ffffffffffffffd, 0x0, 0x1ff, 0x3, 0x7}, 0x8, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000040)="b9fc0a00000f32b9800200000f3266ba2000b000ee9af80000000901b9c70a00000f320fc77698360f01c8650f2169660fc772ae650fc769b2", 0x39}], 0x1, 0x0, 0x0, 0xfecb) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) ioctl$DRM_IOCTL_AGP_ACQUIRE(r5, 0x6430) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$RXRPC_SECURITY_KEY(r5, 0x110, 0x1, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0xe) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000140)={0x0, {0x0, 0x2, 0xe6c6, 0x3}}) 16:38:01 executing program 3: creat(0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x612, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) 16:38:01 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x80) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) listen(r1, 0x1) listen(r0, 0x8000000000000009) close(r0) [ 202.778189] audit: type=1400 audit(1571330281.975:96): avc: denied { wake_alarm } for pid=8663 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 16:38:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r9, 0x0) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r10, 0x4c80, 0x0) r11 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, r10, &(0x7f0000000140)="526959f32c1efa5d459e4feaec3bc88fc185ef2ffbbbde86b62cbc6ed0eefd8c4d6d2abebf5359fe70c86cd59e272769d47c733976aece6f6b351af71a00000000", 0x41, 0x1, 0x0, 0x0, r11}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r9, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) 16:38:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20180}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x1a3204, 0x143) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getgid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x7f, 0x20, 0xac, 0x3, 0x0, 0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x7170, 0x9}, 0x620, 0xe4f, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x5, 0x0) r5 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) close(r5) close(r4) openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) 16:38:02 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000000)={{0x3, 0x0, @reserved="00b75e0d2e380bd861d621faabc22032cee2319d4d702fb6f422bd735e2937d3"}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x100, 0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000340)=0x246c) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f00000002c0)={0x0, 0x3ce1655a, 0x2e1, 0x4}) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) bind$alg(r6, &(0x7f0000000380)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) sendmsg$nl_route(r5, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_newroute={0x38, 0x18, 0x20, 0x70bd25, 0x25dfdbff, {0xa, 0x14, 0x80, 0x67, 0xfc, 0x2, 0xc8, 0xa, 0x300}, [@RTA_PRIORITY={0xfffffffffffffcd0, 0x6, 0xc7}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x800) ftruncate(r4, 0x200006) sendfile(r0, r4, 0x0, 0x8000fffffffe) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_opts(r4, 0x0, 0x9, &(0x7f0000000100)="347681c14e13b00d278964dcce031df056f612f55ab0a4500b4b9104516c59ae9cc3a9fd4fd8edd1debfbc71973a5f1505e7d9974c2f894c53588385a1c58e564df4c51835b6c16e12990a1c8e4173b3161e8be0e740b7136f1a83fe9102fe30131bb41da2b01af27e0553f40645abdf7b56831c58c7fe4e8c33947f6fe9aeeb1cef061ff4049ede9d777837f780c6e7304496d075ab9a667cbc80612135cc46b5fd57e3d7db931388ce467acab27f855e15c7de638e158811390361479f988175d8d0114030b25c1373b6387e8e82dd73edb7451dcd89f531e06d2b2af4", 0xde) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 16:38:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) write$P9_RSYMLINK(r1, &(0x7f0000000180)={0x14, 0x11, 0x2, {0x2, 0x1, 0x4}}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21005}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x22c, r4, 0xb30, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x33}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x17}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="d6e1a0f567a47925182edda70fe90618"}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xe4b}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x628f576ad1719279}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="1dd7ae052904ec0ba072789f034f2842"}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x140280c1}, 0x0) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000140)) sendmmsg$inet6(r2, &(0x7f0000006bc0)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0xa}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000200)='/', 0x1}], 0x1}}], 0x1, 0x40) [ 203.110125] protocol 88fb is buggy, dev hsr_slave_0 [ 203.115335] protocol 88fb is buggy, dev hsr_slave_1 16:38:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="640f01c366b8ad008ed00f08c4417b2c020f3548b800000100000000000f23c00f21f835010008000f23f80fc778fc0f350fd8060f30", 0x36}], 0x1, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) [ 203.244394] ubi0: attaching mtd0 [ 203.276760] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 203.351417] protocol 88fb is buggy, dev hsr_slave_0 [ 203.356528] protocol 88fb is buggy, dev hsr_slave_1 [ 203.361795] ubi0: attaching mtd0 [ 203.450174] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000690000)={0x1c, 0x0, 0x207, 0x1, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@generic="06"]}]}, 0x1c}}, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000040)=0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x998e2b6612acd949, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpid() ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000740)={{0x2, 0xeeedca1656d9f102, 0x6b1, 0x2, 0x6cc}, 0xffffffffffffffc3, 0x20, 0x1}) rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) r4 = creat(&(0x7f0000000680)='./file0\x00', 0x4ebdfff41e1b1426) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000006c0), 0x106}}, 0x20) ptrace$pokeuser(0x6, r3, 0x388, 0xfffffffffffffffe) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x200041, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f00000001c0)={0x400, 0x4, 0x9, 0x100, 0x70bd29, 0x25dfdbfc, {0x7}, [@generic="4e3aec977d80cb5a769dca37d587fff7e4d9eddbd259c2a088a795aa2f53e5cfe19f60f402113d312f06df49fc56c3bda85c5fa78c777981453c16221e074751709bda880005dfe619e09972f614ee790de18532a4b841a96d233ba9d15dc3f0b2c9cef832ab4012f6ec8eb43932fdc9076ac275cdcbd83e", @generic="c69fb4db52a2a73d65088381a3a07e4d1b4002b18b4fd433b075a190f178dc10765c80114b27cbce74fb8a25525fc23ad58412acca5234b770b13cfd1dad08", @nested={0x23c, 0x27, [@typed={0x8, 0x1e, @uid=r2}, @generic="6d49e22a7635d3608ff7f93056f60f59cc6598f6c906a7cd359f9c3cb105ee7b4610f8fe7d2c2317fff7965a51471843ad98100dc8f4d93c8ce3c0976f16f641885ad091e81f946da76e3ae8ecdd3df17a6da9384166ac3b078ebdaa1a3003349c1d25a7325bb42fd8cbad3a087d3c26af4207f1f984d9326e186b688604ad5e5547c016b66288f4bda86d9f97cab62dfe6597e8d3435dcbef87efbd534712930d213d915f8982ca12944850f1b41670b41dac163ecf068590c85283d1f9be283b4b9bbadb87ba693dde04f89664564b6836", @typed={0x8, 0x38, @ipv4=@multicast2}, @typed={0x10, 0x1a, @str=')*wlan0$.\x00'}, @generic="cc96c6bc40d162962a0ab6ecc635c20ae756ed1743a5de523659333c8f7324d2b665e9b7e2e23ae47a5ab7a73f6d346a3f5acacc0157e0aaa803c12555562f1b60c31a25a9b5caae8d8fd5cddcd04982336f5ad0b22e59c8b5ab0a0fad5ec99506fa6eb4bcaae3486c04b5e6", @generic="b934bc736624a6b2f7e38678864291b2d29043f4070db573803f337171afeee3c6df24cee534dd46b8fb904f64c7166b0e283f60615d524a66ca72a452cd00c420ed59275c9063e5fa3abce92a568a0eca962ecb388ebc64fd87d9a98f8596a7399cb292311e503a15c7bc0ded0ef61fae65b99fff1cc5faba4a5c9b473054186e5d2022a2d5ae936e856cbd9e4628f7e9b3020a54fe754a7a62869ab94bd67c390c4be3e1fd4383eee5fe3e666168c5b483c3666473c3b729790228a7371999763279a0be3bf48f0437af1128597b6b52174810997fcbc2cb"]}, @typed={0x8, 0x13, @u32=0x4}, @generic="fa2f8d81559e4c1b1e42c7199458cffd890b9a06a68f1f", @typed={0x8, 0x3a, @pid=r3}, @typed={0xc, 0x3d, @u64=0x559f}, @typed={0x8, 0x22, @u32=0x1}, @generic="b53c6da3a00158126f3465cc1c36561fa04ead8454940667b03870d5e071b4f53a9c7497900bf17146fcc764fe2107e9ab092b51bc9d841e732195ee41ca46bfe6a55eed36899e72f314cb23bc23834a945f6fae9e85d4631c6a284f378644cec8f2085147d4b3c2928ae0fa87bf231e27991fa63be8afcc3c57b215c576d265fd8a0053f665f4065d68e195c8bd9688d7bec118630825831f27e694e7d1b1ec0b24b3ef013f0dfcb0aca76ed1f788f9a5648e75354e9eb03d7a65"]}, 0x400}, 0x1, 0x0, 0x0, 0x4044000}, 0x8000) 16:38:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) pipe2(0x0, 0x84000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) fcntl$dupfd(r5, 0x0, r4) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000800)='cpuset.memory_pressure\x00', 0x0, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r9, 0x0) r10 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r10, 0x4c80, 0x0) r11 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) io_submit(0x0, 0x5, &(0x7f00000018c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0xc4, 0xffffffffffffffff, 0x0, 0x0, 0x29, 0x0, 0x4b81788bfe703f05}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, &(0x7f0000000380)="6262b204637988bc27ddca7f380f73c1712ddd04490a14d099ca874defd27485110a119ae2b79627776d158402000000000013003a76fbea28154e4384734a397ab39f711c725c718dd21513d671893dc56a099299536e34f579be20cf", 0x5d, 0x5}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x7fff, r10, &(0x7f0000000140)="526959f32c1efa5d459e4feaec3bc88fc185ef2ffbbbde86b62cbc6ed0eefd8c4d6d2abebf5359fe70c86cd59e272769d47c733976aece6f6b351af71a00000000", 0x41, 0x1, 0x0, 0x0, r11}, 0x0, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x3, 0x0, r9, &(0x7f0000000880)="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", 0x4fc, 0x83, 0x0, 0x5}]) 16:38:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_SIOCINQ(r0, 0x5411, &(0x7f0000000040)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000080)={0xff, 0x7, 'client1\x00', 0x8000000040000008, '@\x00\x00>|\x00', "4e5fa8d610a144e34c5b30a51f4ffb7de4c8bb981c2ddf67e8e3eef243e3b305", 0x5b8, 0xed3}) 16:38:02 executing program 4: prctl$PR_SET_TIMERSLACK(0x1d, 0xffbffffffffffffc) futex(0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VFIO_GET_API_VERSION(r4, 0x3b64) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0xff86, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES64=0x0], 0x4}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', r3}) 16:38:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000140)='./bus\x00', 0xa88, 0x0) execve(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 203.687583] ubi0: attaching mtd0 [ 203.695643] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:03 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000140)=0x4) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r4 = socket$inet(0x2, 0x4, 0x4) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0), 0x4) sendto$inet(r4, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) [ 203.928685] ubi0: attaching mtd0 [ 203.947008] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:03 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='schedstat\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000380)) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000003c0)={@dev, 0x0}, &(0x7f0000000400)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=@setneightbl={0x84, 0x43, 0x801, 0x0, 0x0, {0x2}, [@NDTA_PARMS={0x70, 0x6, [@NDTPA_LOCKTIME={0xc, 0xf, 0x6}, @NDTPA_RETRANS_TIME={0xc, 0x5, 0x1}, @NDTPA_IFINDEX={0x8}, @NDTPA_DELAY_PROBE_TIME={0xc, 0x7, 0x200}, @NDTPA_APP_PROBES={0x8, 0x9, 0x7fffffff}, @NDTPA_RETRANS_TIME={0xc, 0x5, 0x401}, @NDTPA_ANYCAST_DELAY={0xc, 0xc, 0x3}, @NDTPA_LOCKTIME={0xc, 0xf, 0x1}, @NDTPA_IFINDEX={0x8, 0x1, r1}, @NDTPA_DELAY_PROBE_TIME={0xc, 0x7, 0x3}]}]}, 0x84}}, 0x0) fsetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000240)='a\xff\xff{', 0x4, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0xffffff7f00000000, 0x0, 0x0}, 0x0) write$vhci(0xffffffffffffffff, 0x0, 0x2bd) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f00000005c0)='./file0/f.le.\x00', &(0x7f0000000100)='overlay\x00', 0x80, &(0x7f00000002c0)=ANY=[]) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x2000) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xa7, 0x20000) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f00000001c0)={0x5, 0x2, 0x80, 0x3, 0x80000001, 0x9, 0x8001}) dup(0xffffffffffffffff) r4 = socket$inet6(0xa, 0x80003, 0x9) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000680), &(0x7f00000006c0)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x523) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000180)='.//ile0\x00', r5, &(0x7f00000007c0)='./file0/f.le.\x00') 16:38:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)=0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) gettid() write$P9_RLERROR(r1, &(0x7f0000000400)={0x17, 0x7, 0x2, {0xe, 'memory.events\x00'}}, 0x17) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x95, 0x40000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() write$P9_RSTATu(r4, &(0x7f0000000340)={0xa1, 0x7d, 0x1, {{0x0, 0x76, 0x1, 0x9, {0x2, 0x4, 0x3}, 0x1000000, 0xb95, 0x19, 0x4, 0x16, 'cpuset.effective_cpus\x00', 0x9, 'threaded\x00', 0x12, './cgroup.net/syz1\x00', 0x12, './cgroup.net/syz1\x00'}, 0x16, 'cpuset.effective_cpus\x00', r5, r6, r7}}, 0xa1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r8, 0x6609, 0x0) 16:38:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000480)=0x0) timer_gettime(r2, &(0x7f00000004c0)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) timer_settime(r2, 0x0, &(0x7f0000003480), &(0x7f00000034c0)) timer_settime(r2, 0x0, &(0x7f0000000000), &(0x7f0000000040)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f178f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf4"], 0x14}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@remote}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x6c}, @in=@loopback}}}, 0xf8}, 0x8}, 0x0) 16:38:03 executing program 3: keyctl$assume_authority(0x10, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) shutdown(r0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'irlan0\x00', {0x2, 0x4e23, @empty}}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000340)=""/109}, {&(0x7f00000004c0)=""/16}, {&(0x7f0000000500)=""/135}, {&(0x7f00000005c0)=""/70, 0xffffffffffffffa0}], 0x0, &(0x7f0000000680)=""/93}}, {{&(0x7f0000000700)=@hci, 0x0, &(0x7f0000002b40)=[{&(0x7f0000000780)=""/242}, {&(0x7f0000000880)=""/56}, {&(0x7f00000008c0)=""/244}, {&(0x7f00000009c0)=""/163}, {&(0x7f0000000a80)=""/13}, {&(0x7f0000000ac0)=""/57}, {&(0x7f0000000b00)=""/14}, {&(0x7f0000000b40)=""/4096}, {&(0x7f0000001b40)=""/4096}], 0x0, &(0x7f0000002c00)=""/255}}, {{&(0x7f0000002d00)=@rc, 0x0, &(0x7f0000005280)=[{&(0x7f0000002d80)=""/173}, {&(0x7f0000002e40)=""/181}, {&(0x7f0000004240)=""/4096}, {&(0x7f0000002f00)=""/39}, {&(0x7f0000002f40)=""/183}, {&(0x7f0000003000)=""/212}, {&(0x7f0000003100)=""/255}, {&(0x7f0000003200)=""/58}, {&(0x7f0000005240)=""/23}], 0x0, &(0x7f0000005340)=""/156}}], 0x400000000000143, 0x0, 0x0) 16:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/d\xc4\xd0\x01\x00\xcdr\xa0u\x00', 0x20000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="b9", 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) stat(0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0xfffffffffffffffc, 0x8001) openat$zero(0xffffffffffffff9c, 0x0, 0x18000, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000019c0)=[0x0]) gettid() socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000002c0)=""/190) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8040fffffffd) [ 204.197576] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="640f01c366b8ad008ed00f08c4417b2c020f3548b800000100000000000f23c00f21f835010008000f23f80fc778fc0f350fd8060f30", 0x36}], 0x1, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) 16:38:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000480)=0x0) timer_gettime(r2, &(0x7f00000004c0)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) timer_settime(r2, 0x0, &(0x7f0000003480), &(0x7f00000034c0)) timer_settime(r2, 0x0, &(0x7f0000000000), &(0x7f0000000040)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f178f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf4"], 0x14}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@remote}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x6c}, @in=@loopback}}}, 0xf8}, 0x8}, 0x0) 16:38:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0xa000, 0x20) fchdir(r0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x8da) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r1, 0x0, 0xffffffff) 16:38:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="640f01c366b8ad008ed00f08c4417b2c020f3548b800000100000000000f23c00f21f835010008000f23f80fc778fc0f350fd8060f30", 0x36}], 0x1, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) 16:38:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_RMID(r2, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='+\\\x00') syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x1dd, &(0x7f0000000640)=[{&(0x7f0000000200)="652d22c8b094d5504336c7cea2ee226d5973e680615cf27d04d951b5fadf491e0d4c73fe6eb9612236e31d5b5280883a2510a2928d298ca5dd6267749b912ff61d7d13fe7cd1e5b9366aab21baed4fc8e9b7adcb700e246c1df3ded572576ec58d53a16a867663c5517a898bce48fcea5d68b33b61f1710dfc28c5a7007b82df2a7bb079199c24997798277825948a7a063c2b7de375561da2c302c0be6e05a8a8cd75b475999d096b3df33a12", 0x0, 0x3ff}, {&(0x7f00000002c0)="d2c790a9f5797f7ebf95d18f2732fb252ab0840dcbc952bfd6c4093826aac3cc32ccef856bf779e6872c5b8cf65a400f9bad3af2bbfa5ff326df32a879cfd98f23e5ea01c01a7896aa5f6af3f9d4144f273c6be51c4c88882d63cf9b839f3ad981b71860d540b1af3cd0bc717643711c87389c7bf3b380d83f96e17e9b6061dea86c9a35df864e0be8780b0e309a766e49ad596b0eed1bcb157bf22882324c224db44fb6930d6d176c244d0e11ee9074824d025dc3eedb1849f5b37ad1758f68a3aed75defbf5ec873c27c9be8db8caf17ee39c539f487a84ecb0ae161e7da7febaa4d5b13b85d6399ced1", 0x0, 0x2}, {&(0x7f00000003c0)="2e91bb0b7502ca7f04c81108b276bc3f1ccd9affef67fbeeb631dff1571bb2fd677b72dacbb3d13a9bcea110ed703a1895d4ee578f0af299404db5e76e515d923644734595bc247274150e61e09e0e1c2c53245f768b1e1f4a6874057555eb1d922de3fb34706e9e8c71f1f3139d99deaf9a0d46415be6d39bd9552d9e7c6e0a724323e553f207fb5eb6791e8c58f64028c983524d65193c0b71d107a6eec070086f8a7623634ce5f4ab77473c09189e04face813c1a797aa814f133c6227291ea168536fb8f85c597338f734a83f187275312bece2536564127783f2ff08ad9", 0x0, 0x4}, {&(0x7f00000004c0)="98d31e", 0x0, 0x654d}, {&(0x7f0000000500)="b79f6b491ee0deb8bf392214f87ccea6ac2c83867ff9578a9f5f2fd30c662e63e3c858d2a633987e153b0db9a5586848ec525857696c41e3c928af262c2372564e93fcb54b48bbac1209b2b0bd4c14ec1984f9d56bcb995cc56e0056380532b39b64cc3feac984fa7ea8795a1f8d37a8c453ab16aa5b8cf0481c7cc787a66379f4063f2db3a4", 0x0, 0x4}, {&(0x7f00000005c0)="645f06181fef0bc28418f9d1485e90dd3b9cccda1f63885410b92e27063132e3c4e24574454be58440ab96cad3aa72c98a030ccec3b6d9ed7f8b97644584832047570a6a7d48162cb32b0c47da8af2c05736e5386042360e76008fd1bb8d021a0793960dbc18d5dd88d91ed75d240e717b074d295f0ea604b8a4", 0x0, 0x6}], 0x5, 0x0) [ 204.427940] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:38:03 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) sendto$inet6(r1, &(0x7f0000000100)="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", 0xfb, 0x80, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 204.507167] audit: type=1800 audit(1571330283.705:97): pid=8799 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=16742 res=0 16:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/d\xc4\xd0\x01\x00\xcdr\xa0u\x00', 0x20000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="b9", 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) stat(0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0xfffffffffffffffc, 0x8001) openat$zero(0xffffffffffffff9c, 0x0, 0x18000, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000019c0)=[0x0]) gettid() socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000002c0)=""/190) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8040fffffffd) 16:38:03 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = socket$inet6(0xa, 0x80000, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a538089c2bd6a40fa9c8aa9e4dc6cdc834bcf0980525fe85543221ccf67e1d7b55cabe9e068dd58c6565aa9a9d325ebac77a7ffe7a54cdbd77b3", 0x3}, 0x60) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) [ 204.599816] audit: type=1804 audit(1571330283.755:98): pid=8794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir613667403/syzkaller.6av9BI/56/file0/file0" dev="sda1" ino=16742 res=1 [ 204.661413] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 204.809034] llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -107 0 16:38:04 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x87}, {0x6}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001300add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 16:38:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB=',\x00']) 16:38:04 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000002c0)=ANY=[@ANYBLOB="cd38ffe40f97aaaaaaaaaabb86dd60e3060000100000f9cb16d97f4c55e6aea065050000001cfa3e6ce33b289bd2bf79480af38600907800"/67], 0x0) pipe(&(0x7f0000000000)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)=[0xfffffffa, 0x4]) 16:38:04 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1053002}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x42, 0x400, 0x70bd27, 0x25dfdbfb, {0x1f}, [@typed={0x8, 0x47, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000890) syz_mount_image$reiserfs(&(0x7f00000001c0)='reiserfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x4000, &(0x7f0000000000)={[{@usrjquota_file='usrjquota=syz'}]}) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) socket$inet(0x2, 0x800, 0xe9) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000200)={r4, @in={{0x2, 0x4e23, @multicast2}}}, 0x12a) 16:38:04 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) sendto$inet6(r1, &(0x7f0000000100)="122d2694d4dcdda809b271639a82138c1cb4686fde5f6723840019429e3c3af40d6275fd92fec513bd269e04e7a09f246e4dcb66d87605d7e0a244d79f0b136357d9d5a437f7caad4784a3b917e3b7317467aee8d0f3a8f61f99d27405c4bb8885f00fd677645d66f9cdc6f7df330409f3f3b6ab50b3534e77b651e62601fd8ea7f6e5b630d1dcfec18b60b92eddb85491ff7e7db56acb4c562b99fab9255a2dfbd02643a736a26e9fdf76a4ee650384631713b30aa9c216d3df49432ba10202e3aeee246ec451872b369da6039968be26ee2a1aab2ad20d6d6db2bed5c749cc0732eac9a9cba94690a94b3be5a11e7eae1dcd3295d6f6ecb4f4f9", 0xfb, 0x80, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 204.965197] hfs: unable to parse mount options 16:38:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/d\xc4\xd0\x01\x00\xcdr\xa0u\x00', 0x20000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="b9", 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) stat(0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0xfffffffffffffffc, 0x8001) openat$zero(0xffffffffffffff9c, 0x0, 0x18000, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000019c0)=[0x0]) gettid() socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000002c0)=""/190) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8040fffffffd) [ 205.029118] hfs: unable to parse mount options 16:38:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000000)=0x6) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x400000, 0x3, &(0x7f0000bff000/0x400000)=nil) [ 205.061022] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. 16:38:04 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x334, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) r0 = semget(0x3, 0x1, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000180)) semop(r0, &(0x7f0000000040)=[{0xff4e5d505aa6263f, 0x8}, {0x0, 0x9581}, {0x3, 0x1750, 0x800}, {0x0, 0x0, 0x1800}, {0x1, 0x0, 0x2800}], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1200, 0x1e0, 0x0, [], [{0x801}, {0x801, 0x0, 0x80000001}]}) close(r1) 16:38:04 executing program 4: r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r1, 0x0, 0x420000a77, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r5, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(r5, 0xec816d96ad033378, r2) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[], 0xfffffd88) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/183, 0xb7}], 0x1) close(r2) 16:38:04 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020b000007000000000021003f54036205001a00f50bad5d4dd520175e3b8f8886264fe600081000e0880000004ee2ba575d48775a64e2a597f3c5040069a1920a651003dabb22920b42976fb27ebf770727af96ec154367b14d23ea69213dedfb94dd9401a59e886b1ecc921dbb707f91ae8a9398dc002eb29608fb8e0000000000"], 0x82}}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/4, 0x31852a384220a633) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000080)=0xb, 0x4) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) recvmmsg(0xffffffffffffffff, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) 16:38:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, {0x2, 0x4e21, @broadcast}, 0x396, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)='netdevsim0\x00', 0x6, 0x68, 0x1}) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x1, 0x4) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) sendmmsg(r0, &(0x7f0000007f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="9f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000940)='!', 0x1}], 0x1}, 0xa}], 0x127ad, 0x0) 16:38:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/d\xc4\xd0\x01\x00\xcdr\xa0u\x00', 0x20000, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) pipe(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="b9", 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) stat(0x0, 0x0) getegid() setresgid(0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0xfffffffffffffffc, 0x8001) openat$zero(0xffffffffffffff9c, 0x0, 0x18000, 0x0) open(0x0, 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f00000019c0)=[0x0]) gettid() socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) utimes(0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x8000000000000004, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000080)=@fragment, 0x8) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000002c0)=""/190) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8040fffffffd) 16:38:04 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x334, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) r0 = semget(0x3, 0x1, 0x8) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000180)) semop(r0, &(0x7f0000000040)=[{0xff4e5d505aa6263f, 0x8}, {0x0, 0x9581}, {0x3, 0x1750, 0x800}, {0x0, 0x0, 0x1800}, {0x1, 0x0, 0x2800}], 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x1200, 0x1e0, 0x0, [], [{0x801}, {0x801, 0x0, 0x80000001}]}) close(r1) [ 205.376228] Invalid option length (64652) for dns_resolver key [ 205.470604] Invalid option length (64652) for dns_resolver key 16:38:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000000)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x80020) 16:38:04 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600090800000000000000000003000b3c0000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000001000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e00"/632], 0x278) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000140)={0x90, 0xfffffffffffffffe, 0x1, {0x0, 0x1, 0x0, 0x0, 0x1, 0x200, {0x5, 0x200, 0x5, 0x100000001, 0x7, 0x0, 0x3ff, 0x1, 0x0, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x5}}}, 0x90) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 16:38:04 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0x72) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x3, 0x5e, ['\x00', 'wlan0vboxnet1!bdevl\x00']}, 0x32) sendfile(r1, r2, &(0x7f0000000240)=0x202, 0x4000000000dc) 16:38:04 executing program 0: r0 = epoll_create1(0x0) epoll_create1(0x80000) r1 = epoll_create1(0x0) close(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fdatasync(0xffffffffffffffff) sendmsg$can_raw(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) sendfile(r2, r3, &(0x7f0000000040), 0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x15}) 16:38:04 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x3e, 0x0) write$nbd(r2, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) request_key(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x0, 0x0) [ 205.676904] ubi0: attaching mtd0 [ 205.689496] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:05 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) semctl$SEM_STAT(0x0, 0x758d788dc069ea1d, 0x12, &(0x7f0000000200)=""/44) prctl$PR_GET_NAME(0x10, &(0x7f0000000300)=""/95) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x0, @rand_addr=0x8}}) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYPTR64], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='\x00\x00\x10\x13\x00') sendto$inet6(0xffffffffffffffff, &(0x7f0000000540)="ce03100001000100ff901efc9fb35c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe300", 0x46, 0xffffffffffffffff, 0x0, 0x0) 16:38:05 executing program 5: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) shmat(r0, &(0x7f0000002000/0x4000)=nil, 0x4000) remap_file_pages(&(0x7f0000a7e000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xe192ca46782f1d38) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e21, 0x7f, @local, 0x9122}}, 0x0, 0x2, 0x0, "f9dbd4853bc8f699b4b0c2721f843783db3f86129e8454f34c6ad52db6a3cd2bea5ff9c08db5a9c714d0f505cc4ac8ef77ef7aa59d912f6baafa9c546cd2de45e511e034cabc3e5147db9b2afbf08869"}, 0xd8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x20000, 0x0) r2 = semget$private(0x0, 0x0, 0x220) semop(r2, &(0x7f00000001c0)=[{0x1, 0x1, 0x2800}, {0x2, 0x8000}], 0x2) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) [ 205.929344] mmap: syz-executor.5 (8918) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 16:38:05 executing program 5: r0 = socket$inet(0x2, 0x40000000003, 0x800000800000001) socket$inet(0x2, 0x5, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=0x100, 0x4) getsockopt$inet_mreqsrc(r0, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f00000004c0)=0xc) 16:38:05 executing program 1: sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000240)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="cc2476f2ae", 0x5}], 0x1}], 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000280)=""/203, &(0x7f0000000080)=0xcb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) r4 = syz_open_procfs(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) sendto$ax25(r4, &(0x7f00000000c0)="2f0d763ebee151ef126edb891d31167526a28dc299b66939a266ca9c6b0f2ecb8d38cded7865fc11655c8e930361884e22ba861483f550648ab3e8440cfd80f8276ca99a1b72ca3234a90a41e4943769102f1c44e8674d0883e2615c", 0x5c, 0xee791b17de937d0b, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:05 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) bind$llc(r1, &(0x7f0000000280)={0x1a, 0x30f, 0x6, 0x2, 0xf1, 0xcd, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000001c0)={0x6e}, 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xdd2a55899f979989, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x2400, 0x5, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000800)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x0f@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 16:38:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x224) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r2 = fcntl$dupfd(r0, 0x96026daee83cabc4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r3, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) 16:38:05 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb012ced20587e3dd57e000000000019080000030000b0008e00"], 0x0, 0x1}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x584, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x810, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0xfe) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000002c0)={0x2, 0x1, 0x7, 0x1, 0x7, 0x1}) 16:38:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000100)={0x5, 0x5, {0xd9f2bc4b7392e0aa, 0x2, 0x8001, {0x0, 0x80}, {0x401, 0x1000}, @period={0x58, 0x100, 0x2694, 0x3, 0x400, {0x7, 0x6, 0x6, 0x8}, 0x8, &(0x7f0000000080)=[0xbc2, 0x3, 0x4, 0x3ff, 0x6, 0x5, 0x5, 0x3]}}, {0x54, 0x9, 0x3, {0xbc6}, {0x2}, @period={0x58, 0x6, 0x4, 0x2, 0x8, {0x80, 0x7, 0x1f, 0xa0}, 0x3, &(0x7f00000000c0)=[0xdc4f, 0x1000, 0xe17f]}}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 16:38:05 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600090800000000000000000003000b3c0000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000001000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e00"/632], 0x278) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000140)={0x90, 0xfffffffffffffffe, 0x1, {0x0, 0x1, 0x0, 0x0, 0x1, 0x200, {0x5, 0x200, 0x5, 0x100000001, 0x7, 0x0, 0x3ff, 0x1, 0x0, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x5}}}, 0x90) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 16:38:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x224) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r2 = fcntl$dupfd(r0, 0x96026daee83cabc4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r3, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) 16:38:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x224) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r2 = fcntl$dupfd(r0, 0x96026daee83cabc4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r3, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1}, [@null, @default, @bcast, @null, @bcast, @rose, @bcast, @default]}, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) 16:38:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "953910fde7b9074e", "d74b668b85aa0776df7ff2de53b803ef", "659a0c57", "43dcc12324126fb6"}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x24) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) bind$bt_hci(r2, &(0x7f00000002c0)={0x1f, r5, 0x4}, 0xc) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) readv(r1, &(0x7f0000000140)=[{0x0}], 0x1) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f00000000c0)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x407}) 16:38:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x8000, 0xa, 0x80, 0x100, 0x161, 0x0, r6}, {0x5, 0x1, 0x9, 0xff29, 0x80d, 0x8000, 0x8, 0xfffffffffffffffd}, {0x2, 0x3, 0x7, 0x81}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x9, 0x4d2, 0x6c}, 0x16, @in=@multicast2, 0x34ff, 0x5, 0x1, 0x10, 0x7fffffff, 0x20fc, 0xfff}}, 0xe8) 16:38:05 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x401, 0x200000) getsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) setsockopt$llc_int(r2, 0x10c, 0x3, &(0x7f00000001c0)=0xffffffff, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x1a000, 0x0) ioctl$SIOCX25SSUBSCRIP(r3, 0x89e1, &(0x7f0000000340)={'team_slave_1\x00', 0x3f, 0x3}) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socket$inet(0x2, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r4 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000240)={0x0, 0x80000, r4}) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000100)) ptrace(0x10, r6) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) r7 = getpgid(r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f0000000280)={0x5, 0xcfa, r7, 0x0, r8, 0x0, 0x7, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r9 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r9, 0x0, 0xedc0) openat$cgroup_int(r0, &(0x7f0000000140)='memory.low\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x224000, 0x0) 16:38:06 executing program 1: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000140)}, 0xfffffffffffffc5d) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="df71ffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) write$cgroup_subtree(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x12a3, 0x0, 0xfffffffffffffffb, 0x4, 0x0, 0x0, 0x2000, 0x8, 0x7, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0xca, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x5, @perf_config_ext={0x0, 0x4}, 0x200, 0x3ff, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x283, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x2}, 0x32683, 0x400, 0x8, 0x4, 0xabf, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000005c0), 0x43c) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x4c, 0x80, 0x80, 0x40, 0x0, 0xe1, 0x40000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x8, @perf_config_ext={0xffffffff, 0x1f}, 0x5018, 0x7, 0xffff0001, 0x5, 0x9, 0x401, 0xfff9}, r2, 0xa, r3, 0x12) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000140)={0x2, 0x47504a4d, 0x3, @stepwise={0x8, 0x7fffffff, 0x0, 0x3, 0x0, 0x8}}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x1802a140) socket$kcm(0x29, 0x7, 0x0) 16:38:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000001800)=ANY=[@ANYBLOB="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"], 0x151) 16:38:06 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="020b000007000000000021003f54036205001a00f50bad5d4dd520175e3b8f8886b3193f5bbeb9ee9349f4fd7b816d264fe600081000e0880000004ee2ba575d48775a64e2a597f3c5040069a1920a651003dabb22920b42976fb27ebf770727af96ec154367b14d23ea69461ab040373a2565443d5165fe03f438b2983f06f83afd8aa938d16e0742bb2f2f0e144ea1118551b827c4"], 0x5d}}, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/hash_stats\x00', 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) get_robust_list(0x0, &(0x7f0000000240)=&(0x7f0000000140), &(0x7f0000000340)=0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="4800000700000007000000f6274aa00000000000", @ANYRES32=r6, @ANYBLOB="110400000000000028ae4e5c78bd50172a656768000000005a00ee19a50f2b2dd0ba9e4834fee429a4b70242484d7ca916646eb7cd62ea", @ANYRES32=0x0, @ANYBLOB="0000010000000000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000e00ffffffff0000000008000100736662002c00020028000100000000000000002000000000000000000000000000000000000000000000000000000000d4c3319c2040039248d1bfdd379173b38f5aece3213c473b778ea599381ac68fc8ce3d20fe447cd073fa16e02ec2c40ebe887f35a6ef15d0a3532032f8ef1ba9b3"], 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000002400070500000073b41a0b254a3a39a8", @ANYRES32=r6, @ANYBLOB="00000e00f1ffffff00000000"], 0x24}}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000380)={r6, 0x1, 0x6, @remote}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e23, 0x7fff, 0x3, 0x2, 0xd17586e19c95bd59, 0x0, 0x40, 0x6, 0x0, r1}, {0x0, 0x8, 0x7, 0x3, 0x0, 0x6, 0x1, 0x8}, {0x8, 0x40, 0x800, 0x4}, 0x3, 0x6e6bb8, 0x1, 0x1, 0x2}, {{@in6=@remote, 0x4d2, 0x2b}, 0xa, @in6=@remote, 0x3500, 0x3, 0x3, 0x0, 0x7, 0x7}}, 0xe8) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(r7, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/4, 0x31852a384220a633) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 16:38:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x49f) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xc}}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f00000002c0)=@urb_type_bulk={0x3, {0x7}, 0xffffffe0, 0x4, &(0x7f0000000400)="4bcaa3c19c730817dafcb9334cadb1034f898e5819681d788f4410cd970520dd53bbf4a3ac2d4f431f89664be6e0096fc41841d1fa0f4f9fd135c468f0e8210e278ed77796097293182007ef6c6a82f57f77bbf2afc41387d259315ca7e9e976134a37927bccfb619450a2d5c06563d5b651c8a40af2b427e8c82f37c3d565e53ae68d9a8a09f7e509b6a1e9a67f4578da352ce09a98696429b2a99316e37f38b122b355824a26a061c48d118e4bdfe43f8f68e63738", 0xb6, 0x8, 0x428b, 0x2, 0x20, 0x2, &(0x7f00000004c0)="5ed6cf53fc69a5405fb8e4e3acb6d94ffa2cf1d5459ab04bdcd220c54c437c71b8ea4c5f8215700ba33726a8017dda8681fe989595a438403d77669875e1e3384b10a2c3bd21ee3eddde7f41839bbf1cee20f501b374c03762ca036f8d0ad2f3c09c68c0463121c98c2fae317b95ac206a8988c84d4fd3c58a020a50ac623a3c17fec71ca172d7e59e91f41c14fe55ece81a0dfd4e7ba5d69c0dad24dbc70e88042b0bd7cd2a1660979f266083d60bebd3877374e2c3e6e5b0496a8d"}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4cb]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 207.231740] Invalid option length (454) for dns_resolver key [ 207.253724] Invalid option length (454) for dns_resolver key [ 207.270131] net_ratelimit: 16 callbacks suppressed [ 207.270136] protocol 88fb is buggy, dev hsr_slave_0 [ 207.280218] protocol 88fb is buggy, dev hsr_slave_1 [ 207.299372] kvm: pic: single mode not supported [ 207.299610] kvm: pic: non byte read [ 207.322273] kvm: pic: non byte write [ 207.330831] kvm: pic: non byte read [ 207.338889] kvm: pic: non byte write [ 207.348616] kvm: pic: non byte read [ 207.355938] kvm: pic: non byte write [ 207.365513] kvm: pic: non byte read [ 207.373795] kvm: pic: non byte write [ 207.382277] kvm: pic: non byte read [ 207.389452] kvm: pic: non byte write [ 207.399201] kvm: pic: non byte read [ 207.407474] kvm: pic: non byte write [ 207.415959] kvm: pic: non byte read [ 207.423115] kvm: pic: non byte write [ 207.431584] kvm: pic: non byte read [ 207.439886] kvm: pic: non byte write [ 207.462792] kvm: pic: non byte read [ 207.480266] kvm: pic: non byte write [ 207.496725] kvm: pic: non byte read [ 207.505082] kvm: pic: non byte write [ 207.510098] protocol 88fb is buggy, dev hsr_slave_0 [ 207.515228] protocol 88fb is buggy, dev hsr_slave_1 [ 208.071541] protocol 88fb is buggy, dev hsr_slave_0 [ 208.077359] protocol 88fb is buggy, dev hsr_slave_1 [ 208.390132] protocol 88fb is buggy, dev hsr_slave_0 [ 208.395255] protocol 88fb is buggy, dev hsr_slave_1 [ 208.630866] protocol 88fb is buggy, dev hsr_slave_0 [ 208.636461] protocol 88fb is buggy, dev hsr_slave_1 16:38:09 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r0, 0x0) unshare(0x40000000) r1 = accept(r0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c4600090800000000000000000003000b3c0000000000000000000000004000000000000000000000000000000000000000ec0c380000000000000000000000000001000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e00"/632], 0x278) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000140)={0x90, 0xfffffffffffffffe, 0x1, {0x0, 0x1, 0x0, 0x0, 0x1, 0x200, {0x5, 0x200, 0x5, 0x100000001, 0x7, 0x0, 0x3ff, 0x1, 0x0, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x5}}}, 0x90) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 16:38:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000003780)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000003900)=ANY=[@ANYBLOB="c5daeb3174275d6f63"]) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) setsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000000)=0x1, 0x4) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x62) 16:38:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x8000, 0xa, 0x80, 0x100, 0x161, 0x0, r6}, {0x5, 0x1, 0x9, 0xff29, 0x80d, 0x8000, 0x8, 0xfffffffffffffffd}, {0x2, 0x3, 0x7, 0x81}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x9, 0x4d2, 0x6c}, 0x16, @in=@multicast2, 0x34ff, 0x5, 0x1, 0x10, 0x7fffffff, 0x20fc, 0xfff}}, 0xe8) 16:38:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x1bd, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000001c0)=""/139) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, 0x0, &(0x7f00000002c0)) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000280)='/dev/snd/controlC#\x00', 0x80000001, 0x80000) r2 = open(0x0, 0x0, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x76, 0x1cb) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r4 = semget(0x3, 0x1, 0x8) semctl$SETALL(r4, 0x0, 0x11, &(0x7f0000000180)) semctl$SETVAL(r4, 0x1, 0x10, &(0x7f0000000340)=0x81) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'md5sum\x00'}, &(0x7f0000000140)='-{ppp1eth1\x00', 0xb, 0x2) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000380)={'team0\x00'}) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f00000001c0)) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r7 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x14, r6, 0x1, 0x30bd2d, 0x25dfdbfb}, 0x14}}, 0x24044885) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r8, 0x8933, &(0x7f0000000380)={'team0\x00'}) ioctl$PPPIOCGCHAN(r8, 0x80047437, &(0x7f00000001c0)) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="08002abd7000fcdbdf25010000000c00060001000000000000001c0007000800010015701a0e3cab3d062653bece03a12201749827bb09b5841eca41ed0bfcef16f823592f130eec11cebc569791bede0000000000", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32], 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 16:38:09 executing program 4: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r6, 0x28007d) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="d452a7a22237114fe0181c554f80f816193004a22056cd92e5449b27272e92daa0874bdcc9a935b63a6df8b074ca95", @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB="2cc395ea559561f86491c20600e30046"]) sendfile(r6, r6, 0x0, 0x2008000fffffffe) 16:38:09 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000001c0)=""/48) r2 = open(0x0, 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x2, 0x0, 0x2, 0x200}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000100)={0x3, r3, 0x215eb5c8e585d214, 0x4}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) ptrace$pokeuser(0x6, r5, 0x388, 0xfffffffffffffffe) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) kcmp$KCMP_EPOLL_TFD(r5, 0xffffffffffffffff, 0x7, r4, &(0x7f0000000140)={r6, r0, 0xc4e}) creat(0x0, 0x0) 16:38:09 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(0x0, &(0x7f0000000280)) socket$inet6(0xa, 0x0, 0x10000) getpid() syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000ffdf0000002a0888ae983f409c3c31000000000000000000000a276dc9404f9061794eac7414adfdfa6ed9b62d8a3530d61baa98687342dc675001e8a82854a4ebfa98fa9cf45b236e2444c2ad092664e422af52e88fca2983c1adb718231b639d2fba0804e3f5", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) getgid() setregid(0x0, 0x0) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) r1 = getgid() setregid(0x0, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x81}) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r3, 0x5423, 0x0) r4 = socket$key(0xf, 0x3, 0x2) dup3(r4, r3, 0x0) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) dup3(0xffffffffffffffff, r5, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r7 = socket$key(0xf, 0x3, 0x2) dup3(r7, 0xffffffffffffffff, 0x0) r8 = syz_open_pts(0xffffffffffffffff, 0x1) write(r8, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 210.624439] XFS (loop1): unknown mount option [ÅÚë1t']oc]. [ 210.639138] devpts: called with bogus options [ 210.704094] IPVS: ftp: loaded support on port[0] = 21 [ 210.724451] XFS (loop1): unknown mount option [ÅÚë1t']oc]. [ 211.105379] audit: type=1800 audit(1571330290.305:99): pid=9052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16769 res=0 16:38:10 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x9a, 0xd, 0x5, 0x3ff, 0xd9, 0xff, &(0x7f00000001c0)="a45122bc483684d4b5ebe0dedfb65d4a73e1c09e32060ccfebe0aa0cfe46e6dff7d1bc15774d975870eb7f5444f7e629640b3e5909360c4439c2d077d6e4437c53627c481226efc1fa4934d23ba5bc2b5c5747d75c2fb9b133f3361a7fad097d294fb7f9563871b1169dbb074391624a0ba5c7aa1cd49be1aa8ffb4a72c0c9e9c4182842ecb09eb672705471c1b5ea4bbee0d8ba406b3ea348259df8520ab4f6c86a69334e5b668c5881ff2f8357a1322798f8664c0b872843a7aa94dc9e79759fa28f6cc1aa35ebb399698587d2f966292e49aafbb5106206"}) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000000c0)={0x3, 0xbf5}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_IGMP_VERSION={0x8}]}}}]}, 0x3c}}, 0x0) 16:38:10 executing program 2: r0 = userfaultfd(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000007, 0x4031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000100)={0x1, 0x0, {0x0, 0x7, 0x40, 0x14b7}}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000080)={{&(0x7f00005e3000/0x800000)=nil, 0x760000}, 0x200000}) [ 211.289715] Unknown ioctl -1072147200 16:38:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xed, &(0x7f00000007c0)=[{&(0x7f0000000640)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) memfd_create(&(0x7f0000000140)='ppp0\x00', 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="3100000006a9483e37e542ccb8b8f610678d1a43ffd7eb906fa8844baee5"], 0x5) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000001c0)=0xe3, 0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 16:38:10 executing program 4: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r6, 0x28007d) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="d452a7a22237114fe0181c554f80f816193004a22056cd92e5449b27272e92daa0874bdcc9a935b63a6df8b074ca95", @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB="2cc395ea559561f86491c20600e30046"]) sendfile(r6, r6, 0x0, 0x2008000fffffffe) 16:38:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x8000, 0xa, 0x80, 0x100, 0x161, 0x0, r6}, {0x5, 0x1, 0x9, 0xff29, 0x80d, 0x8000, 0x8, 0xfffffffffffffffd}, {0x2, 0x3, 0x7, 0x81}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x9, 0x4d2, 0x6c}, 0x16, @in=@multicast2, 0x34ff, 0x5, 0x1, 0x10, 0x7fffffff, 0x20fc, 0xfff}}, 0xe8) [ 211.422450] devpts: called with bogus options [ 211.461229] Unknown ioctl -1072147200 [ 211.485174] devpts: called with bogus options 16:38:10 executing program 4: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r6, 0x28007d) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="d452a7a22237114fe0181c554f80f816193004a22056cd92e5449b27272e92daa0874bdcc9a935b63a6df8b074ca95", @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB="2cc395ea559561f86491c20600e30046"]) sendfile(r6, r6, 0x0, 0x2008000fffffffe) 16:38:10 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x20) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x4, 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="78808320c933512a85d62b7be3f08594a6568873522f5c37363af27b6780") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x0, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RUNLINKAT(r3, &(0x7f0000000300)={0x7}, 0x7) fstat(0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x1000000000000002, 0x300) r5 = socket$packet(0x11, 0x1a3d0126c9f74206, 0x300) sendfile(r4, r5, &(0x7f0000000340), 0x0) sched_rr_get_interval(0x0, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r7 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000400)) fsetxattr$security_evm(r7, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="05010000000000020018e510843a13a96205ee0749be2a178cb8476ed45501000000"], 0x22, 0x1) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) 16:38:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000040)=0x3, 0xa7) ioctl(r0, 0x2000000000038, 0x0) [ 211.593085] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 211.618943] devpts: called with bogus options [ 211.626198] EXT4-fs (loop3): filesystem too large to mount safely on this system 16:38:11 executing program 4: socket$packet(0x11, 0x3, 0x300) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1ada42, 0x0) ftruncate(r6, 0x28007d) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="d452a7a22237114fe0181c554f80f816193004a22056cd92e5449b27272e92daa0874bdcc9a935b63a6df8b074ca95", @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB="2cc395ea559561f86491c20600e30046"]) sendfile(r6, r6, 0x0, 0x2008000fffffffe) 16:38:11 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x2dc, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r1) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r4, 0x0, r0, 0x0, 0x7fffffff, 0x0) [ 211.961892] devpts: called with bogus options 16:38:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) getpeername(r1, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000200)=0x80) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r5], 0x28}}, 0x0) bind$bt_hci(r2, &(0x7f0000000240)={0x1f, r5}, 0xc) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) ioctl$SG_SET_DEBUG(r6, 0x227e, &(0x7f0000000100)) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r6, 0x800c6613, &(0x7f0000000140)=@v1={0x0, @aes128, 0x1, "530dfa96a417fbad"}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="0903", 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bond\x00', 0x113) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffffb5, 0xc0, 0x0, 0xfeffffff00000000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) [ 212.066519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:38:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x02am0\x00\x00\x00\x00\x00\x00\x00\xff\xe2\x00', 0x800}) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) recvmmsg(r1, &(0x7f00000059c0)=[{{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000200)=""/59, 0x3b}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0) r3 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000240), 0x4) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = dup(r2) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x1000, &(0x7f0000000040), 0x7c692fed79037ac6, r4, 0x4}) [ 212.146555] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:38:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x4352}], 0x1}, 0x0) 16:38:11 executing program 1: ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) r0 = socket$inet(0x2b, 0x3, 0x20) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1000, 0x408200) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7f, 0x8800) ioctl$TIOCEXCL(r3, 0x540c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") shutdown(r0, 0x1) 16:38:11 executing program 4: syz_read_part_table(0x40000, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/148) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 16:38:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, 0x0, &(0x7f00000000c0)) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r4, 0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000008c0)={r3, r4, 0x1, 0xd, &(0x7f0000000880)="55fee4ae2e311e8822ab38aad8", 0x1, 0xa9, 0x1, 0xfff9, 0x8, 0x6080f5fa52e6a964, 0x7, 'syz1\x00'}) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000007c0)={[0x5ccd8000, 0x7, 0x6, 0x2, 0x0, 0x8, 0x1f, 0x1, 0x3f, 0x800, 0xe700, 0x0, 0x7fff, 0xa0e8, 0x1ff, 0x6], 0x4000, 0x4000}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="911f4b1f702f6fdb38f6af67bee639c5916943589c54f3dced68a4f939435a7f7e8c647353bd4c5d963601ec365cc383750ba7adcb2eccfd4347d0cde0d2e54b00f3f620046845b3050aca033c2a3d5cbcf2f032a2f551138cee35b7e8be037e3b69936a5d60c94c094040a50cdf9e28b8c209183d26", 0x76}, {&(0x7f00000002c0)="f0e55f35a666f09ed6a7fedefb761c17abfac5d857f602884e022d745dab307c847870a8ac09271972618d01793a4935a202558734cd77a80c08fad641e1209c119c454fea2bb0f1471c016779451bab4f02d59de9eebbde55efd70b05a48fd8e5e2af2bcb641849a4de1acfe0ab90dfe761ce375a16957d361951cc49fd8d0ecf4800a9ee5f400ca1fa0dc9947026fb9c17084c52b9c061a5f77a80e7355f52acb7687bd1d0539a76339df3b2c998015cca7c1595e611164bfa2cb55094c8a9e92b40610daa2864516d1f30", 0xcc, 0xffffffffffffffe0}, {&(0x7f00000003c0)="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", 0xfb, 0x8}, {&(0x7f00000004c0)="31040783728d19fa3ef0e4fb76156b18658be6c42796c130d2856615d254b95bd39a5760d4afcef357510a82216ca451e88077b9e4f6a1b57bbfa7ea5d921d828c0693d72f2e6a892c79e3e0e4edc04f35736047ae6935af71f370", 0x5b, 0x80}, {&(0x7f0000000540)="9b678a10b61cbf41fca0c37db184a8fa5b4fb1fb8eb1c72e3b5a4ec234f244d305e0070c3f060dec7dbba5b257c446cb50720ba4eeabb97edc09b40d9312fa77e4a228ff2d3e04675c1403cfce7ea30cdd86380a8a3b542d4ef6848ba2ad39df7c55d60fc8a6831c1725fc851476cdea566f2b53f1c795cfec0377eb", 0x7c, 0x5}], 0x1, &(0x7f0000000700)={[{@uid={'uid', 0x3d, r7}}, {@utf8='utf8'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'bdevwlan0R'}}, {@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, 'memory.events\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise_type='appraise_type=imasig'}, {@audit='audit'}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}) r8 = dup2(r1, r2) write$P9_RREAD(r8, &(0x7f0000000040)={0x6c, 0x75, 0x8001, {0x61, "66a6d525f676d8a4c11df853a6fdb4886d21bcf705e697b247816704352c844a68f0009e5164e9ebcb1cddb768c476038aea93c8f55bcef5fb46db61be997ce74660d5dec5993301841ab33dc09e3a10dcc472d375231adbbc105807b9f683ea7a"}}, 0x6c) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 16:38:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x8000, 0xa, 0x80, 0x100, 0x161, 0x0, r6}, {0x5, 0x1, 0x9, 0xff29, 0x80d, 0x8000, 0x8, 0xfffffffffffffffd}, {0x2, 0x3, 0x7, 0x81}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x1, 0x3}, {{@in=@rand_addr=0x9, 0x4d2, 0x6c}, 0x16, @in=@multicast2, 0x34ff, 0x5, 0x1, 0x10, 0x7fffffff, 0x20fc, 0xfff}}, 0xe8) 16:38:11 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x410000, 0x0) write$UHID_CREATE2(r1, &(0x7f00000002c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xb3, 0x3, 0x2c, 0x2e97, 0x3, 0x3f, "2ff808455e9e6ae363731171640f50d2e3c513e30cf3765a19759cf6f8fd6ba1bd1502272374f6ee32723df1ee7538317af7455c450ae0ea4e4223b05c93fa72d7227f22ca1c836f2e570009c54d2fc625181d9ad677f220876d75afc5089f16e2dc45ba5b7417373200286f49ac1c6a9396e70af5a9f640a987ed430fb33bdf1789cf2015ccc3d789a598366188e3badde00f97eafb473649623af971094a31da1bed4897c615f8b0c16226b0102ba7f84e42"}, 0x1cb) symlinkat(0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) 16:38:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="0900000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01daf355214eeabd24fd620b2022d5ed04090ce0da9ab5c49bd8b9e6e6e7af1c030000004217154653f2f0543d2ac65a1a88d7b492209152105cf880a995d7cdaf017922119c2ac340", 0x82}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x480, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000040)={r4, 0x7fff}, 0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 16:38:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x4352}], 0x1}, 0x0) [ 212.485634] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 16:38:11 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) tkill(r0, 0x1002000000013) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) syz_mount_image$f2fs(&(0x7f00000002c0)='f2fs\x00', &(0x7f0000000300)='./file0\x00', 0xa8e, 0x6, &(0x7f0000000cc0)=[{&(0x7f0000000840)="0dc2c38f0da781b0891418e12e72f980469ccea6ea3c54010719f2bd007c7353a57468c34fa36c5ba117ab51d3201a3c8598ae296d2d172ad8c53e60be7804aa27415e5f6c136ca010d2f2ff079a51d72a9056303057ac77385a7f371c9809305a1eb0bfad48786a80d12fe5075e20fc5d1ab5c7760fd0e70fa09798838c794445e9e8705231b08d3369f845395c247c680e5b02a98ee0be3d4fe1e0f4de43cbe44e145d21afac718d71d71257a318c54a17037888ee441f2bd0d5cf2d6e4080cbfce2cc316d34aae59e524ae488624a95fc51808c4fa0cc", 0xd8, 0x7}, {&(0x7f0000000940)="7ccdf7652b7ec0098dc1eeb9bf970238319303430853e71745e3393d06acce0f6b153c7a94f1a0aac951786540b72acc832200b38814121254c9d053fbed8cb2721e7905e2c2165de7cec545cbfbbcf46f2588ef4e122639eb5795418478017970848e649a49d460d46f53c2d5a2478a5f716a9246eae3be4c6c552255a1608da2f9f474d4640cc4092ea376bdca01572af92be2ae32fb6d88e5d4c75a19870496ca930388d5e6dfb264", 0xaa, 0x3}, {&(0x7f0000000a00)="6d7316def6a82d81742686e1e13fae606c09699eddb1114cf6731c5e7f7920dddd916d82cd329a4e82d51bccb1ef66e7b817a130980e087089d662255c04b87942c275e182fc4fc3cec6d907d55e31420c84a6480c9ecee5fa6fadd684175d13d6e178c547daff1715a7d57cd93eb69e8da1f57439f88421c3bde809e73dee889c56a4c729b8e4d8c7a9c7ad156eba8616518fbb280f1b81c5208bb8fbd1efa7f2d08e31c8109a910bd3580516f50651e58fc2803570db8c4c8e137e52f29a7dc7f821153dfb6fe0345c5cfbd1d720982235fa9fed6b944761853750c89ae0d33fc79b5e10b90dcc22206076393d55fc9f62", 0xf2, 0x1ff}, {&(0x7f0000000b00)="9a7a33c48a2f79bd71b5ed10b878a38fc479c006e633ccd282f163483d5367268e7c3316d8f0", 0x26, 0x100000001}, {&(0x7f0000000b40)="aa38f789aa7bfc8e501bca469d1a20b2ba232bd1ebc3016edf184068f61711206ee6b1d648fe622b33c813328a832dc70c1263f9da9a5167874fd6ed5c0c34dc50a1b5c8e34262ea3e9a75f34b8d88ecba2c1ff10301b6901a7e637d17aff1998d167827bdb9857e22d5355d62ca771af4ac3578b9", 0x75, 0x2}, {&(0x7f0000000bc0)="dc965cf6048b07a54dbc9f57fb0cf2d29d5c80c592f0084f269a55289815674cb6bec68994c04d615db0b9418c12b6e8c4c0599a9d13269e5a4398d5bd0eb200c05e18b58124dd7b0dff4c44aa5e746da0db9167ec5c332eac7b858eb001598a8aada3e1169e9bf4a448199413064516c17f0c3a78320c031f7750c612bd66b0b0b59375bdc8ef09d610cd65979da5bb9357ec1c32743a4fb3a4a7de3c831637cf83eee70cd4aa2f67b55705f7b5fe1f1a5b4717222a4270c8b6727809297040b3ffaab4a9ee52125a", 0xc9, 0x800}], 0x800040, &(0x7f0000000d80)={[{@alloc_mode_def='alloc_mode=default'}, {@noextent_cache='noextent_cache'}, {@noinline_data='noinline_data'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@prjjquota={'prjjquota', 0x3d, 'noinline_data'}}, {@extent_cache='extent_cache'}, {@discard='discard'}, {@lfs_mode='mode=lfs'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ceph\x00'}}]}) r2 = dup(r1) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x30880, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet6_int(r3, 0x29, 0x19, &(0x7f00000001c0)=0x9, 0x4) getsockname$packet(r4, &(0x7f0000000100), &(0x7f0000000180)=0x14) 16:38:11 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x3fa2, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) read$FUSE(r0, &(0x7f00000030c0), 0xfffffed0) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85eb}}}, 0x90) [ 212.550102] net_ratelimit: 16 callbacks suppressed [ 212.550107] protocol 88fb is buggy, dev hsr_slave_0 [ 212.560233] protocol 88fb is buggy, dev hsr_slave_1 [ 212.582898] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 212.755143] libceph: mon1 [::1]:6789 socket error on write [ 212.790135] protocol 88fb is buggy, dev hsr_slave_0 [ 212.795250] protocol 88fb is buggy, dev hsr_slave_1 [ 212.843961] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 212.848583] libceph: mon1 [::1]:6789 socket error on write [ 212.856341] f2fs_msg: 6 callbacks suppressed [ 212.856349] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 16:38:12 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x4000, 0x40) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) pipe(0x0) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x8400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) 16:38:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000700)="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", 0x200}]) [ 212.977157] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 212.991184] ntfs: (device loop5): parse_options(): Unrecognized mount option subj_role. [ 213.006618] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 213.057551] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock [ 213.080632] ntfs: (device loop5): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 213.091720] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) 16:38:12 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x4000, 0x40) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) pipe(0x0) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x8400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) [ 213.112203] Dev loop2: RDB in block 0 has bad checksum [ 213.121249] Dev loop2: unable to read RDB block 1 [ 213.132662] loop2: unable to read partition table [ 213.144511] loop2: partition table beyond EOD, truncated [ 213.153456] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 213.168824] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 213.171976] F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock [ 213.201814] ntfs: (device loop5): parse_options(): Unrecognized mount option appraise_type. [ 213.214849] F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 213.218941] ntfs: (device loop5): parse_options(): Unrecognized mount option subj_role. [ 213.234300] F2FS-fs (loop4): Can't find valid F2FS filesystem in 2th superblock 16:38:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='autogroup\x00') ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000400)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@posixacl='posixacl'}]}}) 16:38:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, r0) add_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r3 = getuid() write$selinux_load(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="8cff7cf9080000005346204c696e75788bf460c096001663bed7e77126e6819fabdb4bae1e46fe1dcb49e1bf047a825d32926dc142730c0102379137bc179fb8ac5aeb59a9f1bac3cc61d72c7853a7f517982bfc1e4c66031f8ec184ae06fc867729694aa92d88c2360e4a0eacb9d1c94ad342837cffdebae587907a39599261596e816e9ce6d734e483b200dfdf4d9f6d316a88a365b8239e181d43e6f2e9b20455416b2ebeedb43c4b9cd10dec6e797bae927bfd3beaf9065d09b6cb9bc08c6a2047b382e02471952890e61ece82867ea36d7cf6cc23ffcfda76726e0fffacaee96d02523a80910b470fe6723416d73cb760689036716c403aaa5101b5f7f5dc68364a092d9c41ad4b660029fbf8123acbc68563cfdd15d768c3a856b287b6774d936cb28f4c520696118d226c467014158187076eba972e1477aca20ed893ffd6db9beb4957fb8245fbfb8db97e0766d043252169eb4b0add54fcee2931e0c72a893359c551a14f24ea37526a2963801cc7e43c0749da2af86f011a8383ffc1f53b71c0632f032bafc372d75c084f"], 0x95) r4 = getegid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x40b00, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000140)={0x0, 0x9, 0xa8}, 0x6) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={r2, r3, r4}, 0xc) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = dup2(r6, 0xffffffffffffffff) ioctl$VIDIOC_S_OUTPUT(r7, 0xc004562f, &(0x7f0000000280)=0x5) socket$kcm(0x29, 0x5, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000002200290800000000000000000400000014000000fe8000000000000000000000000000aa66529caa5e06d34f6d3c918bc339058b52dd1f8dde1fd5e183e572a9b044e61bab10163f2e23dc1433a070c467c96e731410d8e570b44685f044acff782c15cccf1457b0d5af935bc6200e51d8c8685a485429084640a96c3b272c580c81215e5cbdda55ae97352c5718112a1429db97095b5d26b30869da8f9ded6d36882cd401a2acbd4a812f9204e1d3b141cbf44b78021d55403c0b5edd5b43a25541b949f26076ba0f00000000000000"], 0x28}, 0x1, 0xfdffffff00000000}, 0x0) [ 213.320755] Dev loop2: RDB in block 0 has bad checksum [ 213.329428] Dev loop2: unable to read RDB block 1 [ 213.344421] loop2: unable to read partition table [ 213.355392] loop2: partition table beyond EOD, truncated 16:38:12 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x4000, 0x40) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) pipe(0x0) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x8400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) [ 213.376552] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 213.419120] QAT: Invalid ioctl 16:38:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(0x0, 0x0, 0xd2e7bcee6339f23c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xde, 0x109800) readv(r0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/40, 0x28}], 0x1) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0xd13, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) 16:38:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="8da4363ac0ed0000000000000001004d01000000000000000002000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0xfece, 0x10000}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2fc, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r4, 0x400, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x5, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20080080}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x4, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 213.510788] protocol 88fb is buggy, dev hsr_slave_0 [ 213.516308] protocol 88fb is buggy, dev hsr_slave_1 16:38:12 executing program 0: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000240)=0x68) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000100)={0x1, 0xa, "b22c87d8af2871d1f8fc"}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000640)={'filter\x00', 0x5a, "36c3d65c305b2026e7e7185e2438fecdcdf3953ecc8e67297fdf52c34c76d2de35bf02ecfbd5ee388fec1a343c45f77449e2ba94cb0879140424caa821cec3e92a5fbdbab6ae542a4b1b38c8703a5a263a34a1e381887a24cf72"}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0xff, 0x1, 0x0, &(0x7f0000000040)) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000100)) ptrace(0x10, r7) ptrace$pokeuser(0x6, r7, 0x388, 0xfffffffffffffffe) sched_setattr(r7, &(0x7f0000000340)={0x30, 0x0, 0x1, 0x6, 0xdddf, 0x6b, 0x6, 0x2}, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x38a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x200000000, 0xffffffffffffffff}, 0x0, 0x2, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) [ 213.553131] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop5 [ 213.589322] BTRFS error (device loop5): superblock checksum mismatch 16:38:12 executing program 3: open$dir(&(0x7f0000000140)='./file0\x00', 0x4000, 0x40) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr\x1c\xbdn\xa9\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x2000421, 0x1) pipe(0x0) write(r1, &(0x7f0000002000)='/', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x8400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) [ 213.700310] BTRFS error (device loop5): open_ctree failed [ 213.738641] ubi0: attaching mtd0 16:38:12 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(r0, 0x200006) r1 = socket$inet6(0xa, 0x2, 0x0) close(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x2000, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x6) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 16:38:13 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'HL\x00'}, &(0x7f0000000180)=0x1e) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) openat(r3, &(0x7f0000000240)='./file0\x00', 0x4080, 0x40) connect$inet6(r2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r4, 0xc39, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002f80)={r4, 0x3ff, 0x20}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r4, 0x80000001, 0x10}, 0xc) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) bind$netlink(r5, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfc, 0x10200}, 0xc) sendmmsg(r2, 0x0, 0x0, 0x2400ffe0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ASHMEM_PURGE_ALL_CACHES(r6, 0x770a, 0x0) r7 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r7, 0x81007702, &(0x7f0000000100)=""/148) fcntl$getownex(r2, 0x10, &(0x7f00000003c0)={0x0, 0x0}) r9 = syz_open_procfs(r8, 0x0) ioctl$ASHMEM_GET_NAME(r9, 0x81007702, &(0x7f0000000100)=""/148) accept4$rose(r9, &(0x7f0000000300)=@short={0xb, @dev, @rose}, &(0x7f0000000340)=0x1c, 0x80000) ioctl$USBDEVFS_RESET(r7, 0x5514) [ 213.742640] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 213.751874] protocol 88fb is buggy, dev hsr_slave_0 [ 213.751933] protocol 88fb is buggy, dev hsr_slave_1 [ 213.956712] audit: type=1804 audit(1571330293.155:100): pid=9243 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/81/bus" dev="sda1" ino=16785 res=1 16:38:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 214.083402] QAT: Invalid ioctl [ 214.097183] BTRFS error (device loop5): superblock checksum mismatch 16:38:13 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x22) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_getscheduler(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000), 0x148, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x3}, 0x0) r5 = socket(0x10, 0x2, 0x0) acct(&(0x7f0000000100)='./file0\x00') write(r5, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) recvmmsg(r5, &(0x7f0000001240)=[{{&(0x7f0000000340)=@nfc_llcp, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/197}, {&(0x7f0000000580)=""/169}, {&(0x7f0000000640)=""/155}], 0x0, &(0x7f00000004c0)=""/100}, 0x3ff}, {{&(0x7f0000000780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x0, &(0x7f0000000840)=[{&(0x7f0000000700)=""/13}, {&(0x7f0000000800)=""/27}], 0x0, &(0x7f0000000880)=""/146}, 0x2}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000940)=""/173}, {&(0x7f0000000a00)=""/26}, {&(0x7f0000000a40)=""/158}, {&(0x7f0000000b00)=""/210}, {&(0x7f0000000c00)=""/88}], 0x0, &(0x7f0000000d00)=""/117}, 0x8}, {{&(0x7f0000000d80)=@in, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000e00)=""/115}, {&(0x7f0000000e80)=""/224}], 0x0, &(0x7f0000000fc0)=""/74}, 0x4ba0}, {{&(0x7f0000001040)=@hci, 0x0, &(0x7f0000001200)=[{&(0x7f00000010c0)=""/82}, {&(0x7f0000001140)=""/167}]}}], 0x400000000000274, 0x2, &(0x7f0000000200)={0x77359400}) [ 214.181061] BTRFS error (device loop5): open_ctree failed 16:38:13 executing program 3: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x5, 0x57b3f28bbda969ac) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x5, 0x3, 0x2, 0x8001, 0x4, 0xfffff713}) 16:38:13 executing program 5: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8) getpeername$packet(r0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/52, 0x34, 0x100, &(0x7f00000002c0)=@ll={0x11, 0x1e876a4208dcdd07, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x80, 0x4) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000180)) listen(r2, 0x4000000020000000) r4 = socket$inet6(0xa, 0x6, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000100)="fd081887e6b86a3aacb8be38918c57ba63e389909813e374a01a6736aa555dd3daa4498288fe6490fcf7cb1fa863a1a4507fadd0ac5b7acf4ddc82836f9f1af2ca49b4179a4efeec", 0x48) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 214.223116] devpts: called with bogus options 16:38:13 executing program 4: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x8000a, 0xff) recvmmsg(0xffffffffffffffff, 0x0, 0x178, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/222) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x20000000000000c8, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='J!\xdd\x00\xa4\x8cM\n\x03e\x03\xbbl\xd5-\"\xb5\x99\xd6\xd8Z(\xf3wO_\x15\xbd\xd8u)8R\xf9\x98\x996\xcf\a\xd5|\xb5\xb4|a\xc2\xac\xee)L.&L\x82\xf3Rk\xd1\xeb\xfb\x1c\x15\x0fy\x15\x86\xcb!&\xca:\xd8\xad\xa6\'', 0x0, 0x105, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 214.310109] protocol 88fb is buggy, dev hsr_slave_0 [ 214.315248] protocol 88fb is buggy, dev hsr_slave_1 [ 214.324005] ubi0: attaching mtd0 [ 214.349350] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$llc(r2, 0x0, 0x0) r4 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r4, 0x7, &(0x7f0000027000)={0x1}) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r5, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r4, 0x0, 0x0, 0x3}]) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) r8 = syz_open_dev$vbi(&(0x7f0000001380)='/dev/vbi#\x00', 0x0, 0x2) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r9, 0x40186f40, 0x76002d) r10 = accept4$tipc(r9, &(0x7f0000001400)=@id, &(0x7f0000001440)=0x10, 0x80000) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r11, 0x40186f40, 0x76002d) r12 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r13 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r13, 0x40186f40, 0x76002d) r14 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r14, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) r15 = eventfd2(0x8, 0x955837c1137c8449) io_submit(r5, 0x7, &(0x7f00000017c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x2, 0x4, r3, &(0x7f0000000240)="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", 0x1000, 0x2, 0x0, 0x0, r6}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xfffb, r2, &(0x7f0000001240)="21e08733a4be8fd7db0c8f6bd492c5079c3e503c0bafb352e435ade10c2ea2107bfc9eb053d2a953a85c0bb5ad92f4a1472b8e7ecdda2f664f0161a3f766575382bdc07213cecf68732e0d11cca6a9f5272a54f32ea2ee1acc1bcfde3d109530e2f1ba5eb6cd0a9704b3cacb577921dd6ebda1207326d8606a08f76667360aa4249e23839a3df1", 0x87, 0xa59, 0x0, 0x1, r7}, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x6, 0x1f, r3, &(0x7f0000001300)="1d9511568aa1fe528ef2bcb0559c31822f12bdf43e2978baf23f80e18c39909eb8886887f4340b04249acbc66c99cfc3610ee0bcbf5cf5c60d1c619f1ed42df4844780370d", 0x45, 0xffff, 0x0, 0x0, r8}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x7, 0x0, r10, &(0x7f0000001480)="260b63e7346eda76424ce45c05e63b70382dd46f3b7a", 0x16, 0x9, 0x0, 0x1, r11}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x5, 0x1, r12, &(0x7f0000001500)="0bc07c6a83f606deb18546ea518fe14e3cc923af0a56c832896b8c165e041ea39fa529d0c341eeee151661ea8f637ee8b50a09e0f8234f644312269d8caef7a033269b645557fde5a181436bfa713bf5d92c452fc2f207c545ec929cde915087aea136ebc7451246dc322f6925aadca339cd13011229cdadd7a8d999b6883abc3aac4b416cd7f6af590ba63f2d4c963183baa189d0cecf034307f1232e5d2ca7de2dbceea7b40b77e0cd75ca149adbafa443487512c272dd870ba1a5f964696c6b", 0xc1, 0x4bc1, 0x0, 0x1}, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x2, 0x6, r2, &(0x7f0000001640)="5159a8b8af042b002ad33eda741561232ee61f459651561ac39d616750e358f08d9dd5edbdcd19fbf115dd0fb01907a000642e20a5c3947520f3ebb6215c0eec599c8c26c2235fd727247dcc3d9f62a52bfa402ee8999e8b850c412c06e3a9bb6552b3fb145a73747288e078cc31a6c1b22d596ace7e8718b683fa95fd479fa125be0cd864ba3a47283a0ebb3ea084d7e2c596ce43bc3342628322e950b76fc7a10e516f064abd348931b161ce3666245b5f", 0xb2, 0x6, 0x0, 0x0, r13}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x4, 0x72, r14, &(0x7f0000001740)="4f9e2b374cdf35b5c8b42fc4fc27f593c2ff64b60cab361e5d1fbd0caa7357cda66f5de80ab96933c12f28a8edc82295099fa7e0bf", 0x35, 0x2, 0x0, 0x7, r15}]) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getegid() r16 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000080), 0xc) r17 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r18 = getegid() setsockopt$sock_cred(r17, 0x1, 0x11, 0x0, 0x0) r19 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r20 = getegid() setsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000080), 0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0xc) r21 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r22 = getegid() setsockopt$sock_cred(r21, 0x1, 0x11, 0x0, 0x0) getgroups(0x7, &(0x7f0000000140)=[0x0, r18, r20, 0x0, r22, 0xee01, 0x0]) r23 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r24 = getegid() setsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, r24}, 0xc) getgroups(0x7, &(0x7f0000000180)=[0xee01, 0x0, 0x0, 0xee01, 0x0, r24, 0xffffffffffffffff]) r25 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r25, 0xae80, 0x0) dup3(r0, r1, 0x0) dup2(r1, r25) 16:38:13 executing program 3: io_setup(0x7fff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d756e69782c006c21257d7d148b31c53b81af13c812fd81e9ef6e4fd23572b0cfc6c78eef4087b2a47a50e2feacdd17882e7fc809544648ccecfea5bf9dc12cf781d2bc921dfc5f23b4e26a9dfe1df2840335f70a32d9e5938e8622aa0beea2203fc191dbf88a8213d788fe95bc5fff88942084edaccb835aeb168bd026304fac994bf644ca22249f8ba1a2db91f5cae2d37ef010c850623c35c64c25c55c218be72291e0f6eb8730107ed8704e284b934de6c0a4089fafceb22cd06abf88638a44f1657f327c44e13290c0ef858377f2fe70b66ddfada87015a3d4fe"]) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 214.409535] ubi0: attaching mtd0 [ 214.415457] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 214.504902] ubi0: attaching mtd0 [ 214.542783] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) [ 214.579259] 9pnet: p9_fd_create_unix (9281): problem connecting socket: ./file0: -111 [ 214.611732] ubi0: attaching mtd0 [ 214.615596] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 214.629187] 9pnet: p9_fd_create_unix (9284): problem connecting socket: ./file0: -111 [ 214.658334] ubi0: attaching mtd0 16:38:13 executing program 3: io_setup(0x7fff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x163882) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d756e69782c006c21257d7d148b31c53b81af13c812fd81e9ef6e4fd23572b0cfc6c78eef4087b2a47a50e2feacdd17882e7fc809544648ccecfea5bf9dc12cf781d2bc921dfc5f23b4e26a9dfe1df2840335f70a32d9e5938e8622aa0beea2203fc191dbf88a8213d788fe95bc5fff88942084edaccb835aeb168bd026304fac994bf644ca22249f8ba1a2db91f5cae2d37ef010c850623c35c64c25c55c218be72291e0f6eb8730107ed8704e284b934de6c0a4089fafceb22cd06abf88638a44f1657f327c44e13290c0ef858377f2fe70b66ddfada87015a3d4fe"]) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x0}, 0x10) [ 214.662875] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 16:38:13 executing program 5: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8) getpeername$packet(r0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/52, 0x34, 0x100, &(0x7f00000002c0)=@ll={0x11, 0x1e876a4208dcdd07, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x80, 0x4) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000180)) listen(r2, 0x4000000020000000) r4 = socket$inet6(0xa, 0x6, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000100)="fd081887e6b86a3aacb8be38918c57ba63e389909813e374a01a6736aa555dd3daa4498288fe6490fcf7cb1fa863a1a4507fadd0ac5b7acf4ddc82836f9f1af2ca49b4179a4efeec", 0x48) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) 16:38:14 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x48042, 0x0) ftruncate(r1, 0x88001) r2 = socket(0x11, 0x3, 0x81) bind(r2, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x11060440}, 0xc) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) write$FUSE_INTERRUPT(r4, &(0x7f0000000040)={0x10, 0x51716290e4b3e677, 0x6}, 0x10) sendfile(r2, r3, 0x0, 0x4e68d5f8) [ 214.771779] ubi0: attaching mtd0 [ 214.775290] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 16:38:14 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x30929}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000580)={0x2, 0x0, [], {0x0, @bt={0x4, 0x7fffffff, 0x1, 0x4, 0x879f, 0x6, 0x8, 0x1, 0x0, 0x4, 0x80000000, 0x10000, 0x7, 0x0, 0x0, 0x2}}}) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffe52) unlink(0x0) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r5, &(0x7f0000000440)={0x78, 0x0, 0x6, {0x80000000, 0x0, 0x0, {0x5, 0x0, 0x5, 0xff, 0x3fc, 0x7, 0x9, 0xfff, 0x1, 0x7f, 0x1000, r8, r9, 0x0, 0x5}}}, 0x78) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r10, 0x0, r11, 0x0, 0x100000000, 0x0) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f0000000180)=0x0) migrate_pages(r12, 0x8, &(0x7f00000004c0)=0x40, &(0x7f0000000500)=0xfffffffffffffffc) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r7, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 214.824206] 9pnet: p9_fd_create_unix (9296): problem connecting socket: ./file0: -111 [ 214.854876] ubi0: attaching mtd0 [ 214.858444] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 16:38:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x64}, [@ldst={0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1}, 0x48) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0xb8, r3, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e1f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1c05}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x10001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}]}, 0x469}, 0x1, 0x0, 0x0, 0x4000}, 0x44004) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0xf4) r4 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x6, 0x400080) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000000100)) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) ioctl$DRM_IOCTL_ADD_CTX(r5, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GET_CTX(0xffffffffffffffff, 0xc0086423, &(0x7f0000000240)={r6, 0x1}) [ 214.919734] ubi0: attaching mtd0 [ 214.924797] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:14 executing program 4: keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x8000a, 0xff) recvmmsg(0xffffffffffffffff, 0x0, 0x178, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000080)=""/222) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x20000000000000c8, &(0x7f00000000c0)=ANY=[], &(0x7f00000004c0)='J!\xdd\x00\xa4\x8cM\n\x03e\x03\xbbl\xd5-\"\xb5\x99\xd6\xd8Z(\xf3wO_\x15\xbd\xd8u)8R\xf9\x98\x996\xcf\a\xd5|\xb5\xb4|a\xc2\xac\xee)L.&L\x82\xf3Rk\xd1\xeb\xfb\x1c\x15\x0fy\x15\x86\xcb!&\xca:\xd8\xad\xa6\'', 0x0, 0x105, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 214.985621] devpts: called with bogus options 16:38:14 executing program 1: socket(0x3, 0x802, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000700ab092500090007000a009700000000000000e293210001c000000000000000000000ffffffff9815fa2c1ec28656aaa79bb94b46fe000000bc00020000036c6c256f1a272fdf0d11512fd633d44000000007008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a463ae405566f91cf1905000000d243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a105004f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf1587c3b410000001930624b0e58a2c36ab5a303fc60873ee135c0817673fa208cb8aecf063a091c98c7375683be9d", 0xff2a) [ 215.020495] Process accounting resumed [ 215.029337] Process accounting resumed 16:38:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000040)="b6a4221404de02a8ea01711d992b9a44f7345ea89e0f47cf393986f55caeac4dc1f2cda020f93b421d05c3381820cdab735d96e7b8842602b806080716a51185bbc9df5523a0707bb114324d4b21a379b9f255a9f42d375572b1d1e3c72d2a6402e39c045390762f290e9c7a4ed0d5fa4b65b008b9632de0c13fbea4f313b2099dd673aed35c2489586e85f49c2de4d29a5ce6e205725221fa079dacf38784") ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x1f, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f0000000000), 0x4) connect$llc(0xffffffffffffffff, 0x0, 0x0) 16:38:14 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 0x20, 0x2, 0x190, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x208) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x174, r1, 0x4, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffff1c}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xcac, @ipv4={[], [], @multicast2}, 0xff}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 16:38:14 executing program 5: syz_open_dev$radio(0x0, 0x1, 0x2) r0 = syz_open_procfs(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8) getpeername$packet(r0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f00000001c0)=""/52, 0x34, 0x100, &(0x7f00000002c0)=@ll={0x11, 0x1e876a4208dcdd07, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0x80, 0x4) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000180)) listen(r2, 0x4000000020000000) r4 = socket$inet6(0xa, 0x6, 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1}, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000100)="fd081887e6b86a3aacb8be38918c57ba63e389909813e374a01a6736aa555dd3daa4498288fe6490fcf7cb1fa863a1a4507fadd0ac5b7acf4ddc82836f9f1af2ca49b4179a4efeec", 0x48) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 215.209944] ubi0: attaching mtd0 [ 215.220829] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 16:38:14 executing program 2: msgget$private(0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000000)=0x80) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) socket$inet(0x10, 0x2, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x11) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) r6 = socket(0xa, 0x1, 0x0) close(r6) sendmmsg$inet_sctp(r6, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="20000000000000008400002002000000000004000000000000000000", @ANYRES32=0x0], 0x20}], 0x1, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000001c0)={0x3f, 0x6, 0xa, 0xf38e, 0x5, 0x2, 0x1, 0x5, r8}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000240)={r9, @in6={{0xa, 0x4e23, 0x8, @remote, 0x100}}}, 0x84) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x87fffff, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:38:14 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fffffff}, 0x30929}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r1) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r4) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000580)={0x2, 0x0, [], {0x0, @bt={0x4, 0x7fffffff, 0x1, 0x4, 0x879f, 0x6, 0x8, 0x1, 0x0, 0x4, 0x80000000, 0x10000, 0x7, 0x0, 0x0, 0x2}}}) r5 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0xfffffffffffffe52) unlink(0x0) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r5, &(0x7f0000000440)={0x78, 0x0, 0x6, {0x80000000, 0x0, 0x0, {0x5, 0x0, 0x5, 0xff, 0x3fc, 0x7, 0x9, 0xfff, 0x1, 0x7f, 0x1000, r8, r9, 0x0, 0x5}}}, 0x78) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r10, 0x0, r11, 0x0, 0x100000000, 0x0) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f0000000180)=0x0) migrate_pages(r12, 0x8, &(0x7f00000004c0)=0x40, &(0x7f0000000500)=0xfffffffffffffffc) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r7, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 16:38:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="4c0000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000000000002000000080002000000000032d3fc0c9300a6a5b790ae0d8dbf04000000000000002ed11dbf61345ffd2f93f7937307f0f7e236d60f22d6e3b341fc8722137427e5d9fa6d2f765fe91fbcdd9e3eb3457075b75184ff51119cdf900fd6ce6374b969e0e0a83e61a81ccff2f5bc36e592ce7ce23e64579eb3f60b1578517fe0f7b06adb5f1a55c2dcf3505774814357000000"], 0x4c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x11, 0x507, 0x0, 0x0, {0x0, r5}}, 0xd4}}, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="55872bbd7000fbdbdf250300000008000800eb5ea49efe5400000000140009000000000000000000000000000000000008000600000000040800cda03f83d012880e050014000900ff0100000000000000000000ef2ef8f008000600000014c3140009000000896380e8634200b858ce00df00"/126], 0x74}}, 0x4000144) [ 215.313770] ubi0: attaching mtd0 [ 215.317344] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 215.372440] ubi0: attaching mtd0 [ 215.376058] ubi0 error: ubi_attach_mtd_dev: bad VID header (67108864) or data offsets (67108928) 16:38:14 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x144}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@dev}}, {{@in=@multicast2}}}, 0x0) mremap(&(0x7f00007a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00004f4000/0x4000)=nil) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000340)=""/196) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000440)={0x9789, 0x6, 0x7}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001e0001faffffffffffffff0007000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008000a00a28ace70d78171de307f9be6caa5f1cc65e5f4fbaaf016bc45b85e0206bb8b0cc4c81f9d22d341ad6641cddbb164b0071d6ba374bbd66fd5e5b1b8fe3e8ad17e129c0d896248b06c5249f02bd74f53a07997e88c4ceb902cdf14d7618a41134a6b01962b08000000000000003739edf0a7f82586", @ANYRES32=r5], 0x28}}, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r5, 0x1, 0x6, @broadcast}, 0x10) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000100)=""/111) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$TCSETX(r0, 0x5433, &(0x7f00000000c0)={0x77c, 0x3, [0x6cf3, 0xffb5, 0x9, 0xe500, 0x7ff], 0x4}) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000000)={&(0x7f00003f6000/0x2000)=nil, 0x80000000, 0x0, 0x4b053c4f055fa66, &(0x7f0000618000/0x2000)=nil, 0x5}) fcntl$dupfd(r0, 0x0, r0) 16:38:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x2) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_POLL(r3, &(0x7f0000000140)={0x18, 0x0, 0x5, {0x8}}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r4, &(0x7f0000000000), 0x1c) memfd_create(&(0x7f0000000040)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r5 = socket$inet(0x2, 0x2, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000200)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r5, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) recvmmsg(r5, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001380)=""/134, 0x45}], 0x1}}], 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) [ 215.475593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 215.621756] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. [ 215.675146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9349 comm=syz-executor.0 [ 215.688415] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 215.790878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 16:38:15 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000280)={0x5, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578698395d771139ef4c3e8ef91c5a51234e3735d3ba7eb5493d341776f26f22b673fe17a770b66f5326d73e75f162043f000e2512a041be2a987de0a1b71da0fb36fd7bf44b404454683453c3a9da8bf7c5e8c657656c5be2a739dba75301dd8e37adb657cf8ba485765ae833e5b1579af6ed3802a8201da3be2f601a5c5b202e03711fb5d5d4eaac946c58ae724aad79a4a7040fe98f37799503440eb86ad92872e28493a9200b8fa4c7ccc"], 0xbb) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x6c}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0xffffffffa0008000, 0xe, 0x0, &(0x7f0000000200)="fbbe22cf104c948f665e6007769d", 0x0, 0x2b1}, 0x28) write$binfmt_misc(r5, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xd3) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) 16:38:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) mprotect(&(0x7f0000008000/0x1000)=nil, 0x1008, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) socket$inet6(0xa, 0x80001, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000003, 0x11, r1, 0x0) r4 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r4, 0x208200) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) r6 = open$dir(&(0x7f0000000040)='./bus\x00', 0x50040, 0x80) renameat(r5, &(0x7f0000000000)='./bus\x00', r6, &(0x7f0000000080)='./bus\x00') sendfile(r2, r3, 0x0, 0x8000fffffffe) r7 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r7, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20022}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 16:38:15 executing program 0: r0 = epoll_create1(0x0) r1 = socket(0x11, 0xa, 0x0) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="df620d2e757ad1b9a3e83836a73a7ea5a47324a4fb96dda26c90e7c78b8aa801159f42e58e5eefa45166f54e8353caa338e110faebaa66b0ab9147a30fe116b5e5af5453df986db0a298", 0x4a, 0xffffffffffffffff) r3 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r3, &(0x7f00000001c0)=""/103, 0x67) r4 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r4, &(0x7f00000001c0)=""/103, 0x67) keyctl$search(0xa, r2, &(0x7f0000000240)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, r4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x4}) [ 216.137255] kauditd_printk_skb: 10 callbacks suppressed [ 216.137264] audit: type=1400 audit(1571330295.335:111): avc: denied { map } for pid=9369 comm="syz-executor.3" path="/dev/bus/usb/007/001" dev="devtmpfs" ino=15274 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usb_device_t:s0 tclass=chr_file permissive=1 16:38:15 executing program 5: msgget$private(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000200)=r0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000000)=0x80) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r3, 0x0) socket$inet(0x10, 0x2, 0x0) ftruncate(r0, 0x48280) r5 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14}, 0xfffffff4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81000) sendmsg$key(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="020f0902130000006307b7cc5f1bdf25050019000000000002004e207f0000010000000000000000493657a8d3ff02004e24ffffffff000000000000000002001000000004d5000004d5000000000800120002000300b06b6e000900000006003c0000fb00000700000000000000e00000020000000000000000000000000000000000000000000000000000000002000a00800000000100"], 0x98}}, 0xc3e2e766529f24d2) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x87fffff, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:38:15 executing program 0: perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x7, 0x3, 0x4, 0x7, 0x0, 0x81}) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) syz_open_dev$ndb(0x0, 0x0, 0x0) syz_open_dev$dspn(0x0, 0xd911, 0x20000) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40100, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, &(0x7f00000000c0)=0x3) [ 216.295114] ubi0: attaching mtd0 [ 216.325666] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 216.431844] block nbd0: Receive control failed (result -22) [ 216.438216] audit: type=1804 audit(1571330295.635:112): pid=9392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/77/bus" dev="sda1" ino=16705 res=1 16:38:15 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) capget(&(0x7f0000000200)={0x20071026, r0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x37b4bc7d, 0xac}) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@mangle={'mangle\x00', 0x1f, 0x6, 0x530, 0x2d0, 0x0, 0x1b8, 0x3b8, 0x3b8, 0x498, 0x498, 0x498, 0x498, 0x498, 0x6, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x18}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@broadcast, @multicast2, 0xff, 0xff, 'syzkaller1\x00', 'syz_tun\x00', {}, {0xff}, 0xff, 0x0, 0x40}, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffff, 0x0, 0x1}, {0x2, 0x81}, {0x7f, 0x0, 0xd1}, 0x2, 0xff}}}, {{@ip={@multicast1, @loopback, 0x0, 0xffffffff, 'yam0\x00', 'ip6tnl0\x00', {0x7f}, {0xff}, 0xe1, 0x0, 0x2}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x0, 0x40}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0x0, 0x3f, 0x8}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x590) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x8f) r2 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x4}}, 0x20) ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, 0x0) chdir(&(0x7f0000000180)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) prctl$PR_GET_THP_DISABLE(0x2a) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40000012, 0xffffffffffffffff, 0x0) [ 216.580222] block nbd0: shutting down sockets 16:38:15 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000002c0)='ke\x00', 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x800) get_thread_area(&(0x7f0000007d40)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)={0x0, 0x4, 0x1, [0x3]}, &(0x7f0000000340)=0xa) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000380)={r2, 0xea, 0x6, [0x9, 0x8, 0x0, 0x4, 0x9a9, 0x0]}, 0x14) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) ioctl$NBD_DO_IT(r3, 0xab03) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000180)) creat(&(0x7f0000000200)='./file0\x00', 0x8) poll(0x0, 0x0, 0xffffffff) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)=0x73) creat(&(0x7f00000001c0)='./bus\x00', 0x200000002) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000002c0)="d353ff072d68b2e4dc05000000b3d94c22") [ 216.601063] block nbd0: Could not allocate knbd recv work queue. [ 216.631997] block nbd0: shutting down sockets 16:38:15 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, 0x0, 0x0) fcntl$dupfd(r3, 0x406, r1) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) r5 = socket(0xa, 0x1, 0x0) close(r5) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000240)={r7, @in6={{0xa, 0x4e23, 0x7ff, @local, 0x401}}, 0x38, 0x4, 0x5, 0x93, 0x9e}, &(0x7f0000000300)=0x98) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r8, 0x6, 0x1, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x4e22, 0x9, 0x4e23, 0xff, 0xa, 0x80, 0x0, 0x6, 0x0, r9}, {0x40, 0x0, 0x100, 0x4, 0x88ab, 0x100000001, 0x2b, 0x5}, {0x10001, 0x8, 0x5, 0x8}, 0xfffffffe, 0x0, 0x0, 0x1, 0x7}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4d2, 0x32}, 0xa, @in6=@mcast2, 0x34ff, 0x4, 0x3, 0x9, 0x6, 0x6, 0xfff}}, 0xe8) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond0\x00'}) 16:38:15 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r0, 0x0) 16:38:15 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10100, 0x0) r2 = socket(0xa, 0x1, 0x0) close(r2) sendmmsg$inet_sctp(r2, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x20) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4}, 0x8) [ 216.685569] audit: type=1804 audit(1571330295.695:113): pid=9379 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/77/bus" dev="sda1" ino=16705 res=1 [ 216.741839] bond0: cannot enslave bond to itself. [ 216.779269] ubi0: attaching mtd0 [ 216.782966] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 216.815110] bond0: cannot enslave bond to itself. [ 216.934141] overlayfs: './file0' not a directory [ 217.021927] audit: type=1804 audit(1571330295.705:114): pid=9392 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir184342781/syzkaller.RzvDGI/77/bus" dev="sda1" ino=16705 res=1 [ 217.133436] audit: type=1400 audit(1571330295.935:115): avc: denied { map } for pid=9406 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=15228 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 [ 217.175403] audit: type=1400 audit(1571330296.145:116): avc: denied { ioctl } for pid=9398 comm="syz-executor.3" path="socket:[36332]" dev="sockfs" ino=36332 ioctlcmd=0x6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 217.255527] ubi0: attaching mtd0 [ 217.258951] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:16 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, r0, 0x0) 16:38:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x8, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000003c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 16:38:16 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003740)=[{{&(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, 0x0}, 0x61}], 0x1, 0x8b056c90a14ffe27, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) writev(r1, &(0x7f00000023c0), 0x1000000000000252) 16:38:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000140)={0x0, 0xfff8, 0x3ff}, 0x8) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x388) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) signalfd(r3, &(0x7f0000000180)={0x9}, 0x8) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0xe2a}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 16:38:16 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x11}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000000)=0x14) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:38:16 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000eab8ad8eb431cec46d00000000020000d47eb5c3538470db3225475db3247da87f0fd43d0db857e8fdaa051c76771264f5685c644354343d520c1fc57d710ee05ee6b9501988de6ffd7cdd9d058b635f64b64e0e5674e7e21ce973ab03736d031f7970ef5ed158f7172dc7f3b80f8d3f76cb9c6e81081ca9a8b7ccb948269d264d9972f6331c0490432800c622296de6e1d523a31ae4f4b3407bbba12d21e16ec7275175b6e3cb204f9d213525e7c99bbda2d40a9b2a40c4b7ee58c4bc"], 0x0, 0xc5}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)=""/4) write$P9_RWRITE(r4, 0x0, 0xffffffffffffff3f) getpeername$packet(r4, &(0x7f00000000c0), 0x0) r5 = creat(0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r5, 0x40505331, &(0x7f0000000440)={{0x7f, 0x9}, {0x33, 0x20}, 0x0, 0x0, 0xbd}) close(r4) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000140)={0x8}) ioctl$TIOCGPTPEER(r4, 0x5441, 0x20) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = semget(0x3, 0x1, 0x8) semctl$SETALL(r6, 0x0, 0x11, &(0x7f0000000180)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r7 = shmget(0x3, 0x4000, 0x4, &(0x7f00005cf000/0x4000)=nil) r8 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r8, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) getresuid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getpid() rt_tgsigqueueinfo(r12, r12, 0x16, &(0x7f0000000100)) ptrace(0x10, r12) ptrace$pokeuser(0x6, r12, 0x388, 0xfffffffffffffffe) shmctl$IPC_SET(r7, 0x1, &(0x7f0000000640)={{0x8, r9, 0xee00, r10, r11, 0x26}, 0xc6, 0x3, 0x5, 0x6, r0, r12, 0x1}) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f00000006c0)=""/57, 0x39}], 0x1, 0x0) [ 217.403566] ubi0: attaching mtd0 16:38:16 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x358fa4465a21aab2, @perf_config_ext={0xfffffffffffffe01}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) write$9p(r0, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x55bdb32c, 0x4000) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x3, 0x200, 0x401, {0x77359400}, {r3, r4/1000+10000}, {0x4, 0x1, 0x0, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x18, 0x7, 0x0, 0x0, "fb85fb60db8c4de1f44f1e9de1872d5bcb64aed16999ee6300850b94b0a5124f00ac222044ad47c94fb3c0eab4c2c9af6dd975129708a5642a9e3ef04c3c0c28"}}, 0x80}, 0x1, 0x0, 0x0, 0x20008040}, 0x40000) 16:38:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000001c0)=""/48) open(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) open(0x0, 0x141042, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40000120) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x84708, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) creat(0x0, 0x0) [ 217.431322] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e22, 0x9, @remote, 0x8}, {0xa, 0x4e23, 0x0, @remote, 0x7fffffff}, 0x99c, [0xea, 0x4, 0x1, 0x6, 0x6, 0x81, 0x10000, 0x100]}, 0x5c) write$P9_RVERSION(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r3, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r3, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x102, 0x0) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f00000002c0)=0x2, 0x4) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x400, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r5, @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) stat(&(0x7f00000008c0)='./file0\x00', 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 217.527764] audit: type=1800 audit(1571330296.725:117): pid=9444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16550 res=0 [ 217.566728] ubi0: attaching mtd0 [ 217.568156] audit: type=1804 audit(1571330296.725:118): pid=9444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="file0" dev="sda1" ino=16550 res=1 [ 217.598800] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b78ce4802090a88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x19) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040), 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x6dd7, 0x0, 0x2, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2bcf9ec589a5ae2f61ff88671df562767e6b158bf79c993b80d7d254a88d156c8d08f28c5f1851ffbc5adeaac76689f459fe12d5ee07c1747bca528b35abd3283ad9bc5719909fe7e938cfa9d00a7d77676892fdae8d92d75f"], 0x0) unlink(&(0x7f0000000040)='./file0\x00') r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000540)={{{@in=@empty, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) open(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x40000, 0x20) fcntl$dupfd(r0, 0x0, r0) [ 217.671075] net_ratelimit: 14 callbacks suppressed [ 217.671110] protocol 88fb is buggy, dev hsr_slave_0 [ 217.677293] protocol 88fb is buggy, dev hsr_slave_1 16:38:17 executing program 5: syslog(0x2, &(0x7f00000000c0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, &(0x7f0000002a00), 0x33b}}], 0x1, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x20000000010005, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0x0, r2) setfsgid(r2) dup2(r0, r1) r3 = add_key(&(0x7f00000000c0)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, r3, &(0x7f00000002c0)=""/213, 0xd5) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) writev(r1, &(0x7f00000023c0), 0x1000000000000252) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) 16:38:17 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000300)={0x7, 0xf0, "894fee363db2858750f8549a10bc64ba0ba9397371713bdf2ee2723836cbe32c7705873d512bb17d875dc9349ea4bd3462046352731caef9a2bdf1b3f5659502432a9571d2d199bb9428e0ae85245ecb73fc5f9c03fc7dd48a29af5cac6beb452e955204871d26e86b99b542d83a3b9a5b6853cac44bac671a1beaa0c751504f71864d1110978f1970f31297b68a10e14be85a50bfdd65253bbed0549250377365188fb7b946ec9790ca036c1fcc1ae325ee0b7c540b436956a32765a6741580508f624b2aa862a1d3d8c0f35b64aa9e61c6dce0fb4fe9c1c9e1340d0c8d61eadd6b74c479b6b711df12326920ac7f8e"}) fchdir(r0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000240)={{0x68, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x4, 'wlc\x00', 0x7e, 0x1000000, 0x1a}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x10000, 0xecf7, 0x7, 0xffffffff}}, 0x44) truncate(&(0x7f0000000000)='./file0\x00', 0xa85c) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) ioctl$sock_bt_hci(r5, 0x800448f0, &(0x7f0000000140)="e7fbf64fe19870ac23c57864d3fd123cb875a346241e0ef3be400cb193a1c44be070f119bd0353174d1af9efde0a79235970c56c7f68ffa0045791") r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup3(r6, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 16:38:17 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) r7 = creat(0x0, 0xbc9dc8fbd81cb4b1) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r7, 0x0, 0x0, 0x3}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r9, r7) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={r13, 0x9}, 0x8) io_setup(0x4, &(0x7f00000004c0)=0x0) r15 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r15, 0x40186f40, 0x76002d) io_submit(r14, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r15, &(0x7f0000000780)="56a40bea5635a9bd462b521ab6e31b8e22a9bddfc6587b154990afa41e681d03c73f2e5706eb91b29a4f4ae01979d9048c4d87fb2da00f0befb245ea0907f995e7d5dee4da1d257b9c20a14b9e08513288b65829e821cc110fa486b6c1e5124bd4807c67a22c22d1ccdd61eec9c2d10cc4c1e8eb6e70e7a8bf1b8feaa4e28f5100bf8f4aea6de2488470348edc339592a15395680e6e8b50500db2ef71db36f2c967d340af15711177f126c47b76d938c8a93df8cde361dc03b9ed88ec15d09b0c7d3365da20961e31700f0a6ce84964af80a749692ce1bddb", 0xd9, 0xffffffffffffff97, 0x0, 0x1}]) socket$inet(0x10, 0x0, 0x0) 16:38:17 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001300), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp\x00') write$vhci(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file2\x00', 0xffffffffffffff9c, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$FUSE_INTERRUPT(r1, &(0x7f0000000400)={0x2d8}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') dup(r2) sendfile(0xffffffffffffffff, r3, 0x0, 0x523) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x4800) renameat(0xffffffffffffffff, &(0x7f0000000180)='.//ile0\x00', 0xffffffffffffffff, &(0x7f00000007c0)='./file0/f.le.\x00') [ 217.893676] audit: type=1400 audit(1571330297.085:119): avc: denied { syslog } for pid=9466 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 217.920131] protocol 88fb is buggy, dev hsr_slave_0 [ 217.925256] protocol 88fb is buggy, dev hsr_slave_1 [ 217.937888] audit: type=1800 audit(1571330297.095:120): pid=9478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16625 res=0 [ 218.154716] ubi0: attaching mtd0 [ 218.158180] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 218.182849] overlayfs: filesystem on './file0' not supported as upperdir 16:38:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket(0x10, 0x2, 0x0) recvmmsg(r1, &(0x7f0000006080), 0x478, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000140)='./bus\x00', 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/de\x89.vcs\x00', 0x402a00, 0x0) accept$netrom(r5, &(0x7f0000000440)={{}, [@rose, @null, @rose, @bcast, @bcast, @rose, @rose, @netrom]}, &(0x7f0000000200)=0x48) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x0, 0x0) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ashmem\x00', 0x80000, 0x0) sendfile(r7, r6, 0x0, 0x9) r8 = socket$inet6(0xa, 0x6, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000002, 0x100810, r8, 0x40000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000100), 0x9, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8040) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4002) io_setup(0xc32f, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) fchmod(0xffffffffffffffff, 0x0) 16:38:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="696e6f646536532c9794bbc9a3e40300000000000000ff0f"]) 16:38:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x1c, 0x16, [{0x18, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14}]}]}, @IFLA_GROUP={0x8}]}, 0x44}}, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) r2 = accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev}, &(0x7f0000000040)=0x10) r3 = syz_open_procfs(0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000100)) ptrace(0x10, r4) ptrace$pokeuser(0x6, r4, 0x388, 0xfffffffffffffffe) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000002c0)={{0x8, 0x5, 0xff, 0x6, 'syz0\x00', 0xffffdd49}, 0x6, 0x2, 0x100, r4, 0x4, 0x9, 'syz0\x00', &(0x7f0000000280)=['em1#\x00', '\'wlan0selinux\x00', 'keyringem0cgroup}user#\x00', '\x00'], 0x2b, [], [0x0, 0xe44, 0x0, 0x1000]}) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x7, [0x0, 0x1, 0x248d, 0x8, 0x6, 0x7, 0xff]}, &(0x7f00000000c0)=0x16) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000100)={r5, 0x8, 0x30, 0x4, 0x1d}, &(0x7f0000000240)=0x18) 16:38:17 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) r7 = creat(0x0, 0xbc9dc8fbd81cb4b1) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r7, 0x0, 0x0, 0x3}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r9, r7) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={r13, 0x9}, 0x8) io_setup(0x4, &(0x7f00000004c0)=0x0) r15 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r15, 0x40186f40, 0x76002d) io_submit(r14, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r15, &(0x7f0000000780)="56a40bea5635a9bd462b521ab6e31b8e22a9bddfc6587b154990afa41e681d03c73f2e5706eb91b29a4f4ae01979d9048c4d87fb2da00f0befb245ea0907f995e7d5dee4da1d257b9c20a14b9e08513288b65829e821cc110fa486b6c1e5124bd4807c67a22c22d1ccdd61eec9c2d10cc4c1e8eb6e70e7a8bf1b8feaa4e28f5100bf8f4aea6de2488470348edc339592a15395680e6e8b50500db2ef71db36f2c967d340af15711177f126c47b76d938c8a93df8cde361dc03b9ed88ec15d09b0c7d3365da20961e31700f0a6ce84964af80a749692ce1bddb", 0xd9, 0xffffffffffffff97, 0x0, 0x1}]) socket$inet(0x10, 0x0, 0x0) [ 218.333823] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 218.353255] XFS (loop3): unknown mount option [inode6S]. [ 218.470121] protocol 88fb is buggy, dev hsr_slave_0 [ 218.475232] protocol 88fb is buggy, dev hsr_slave_1 16:38:17 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f000005b000/0x1000)=nil, 0x1000, 0x2, 0xa132, 0xffffffffffffffff, 0x4) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x44800, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000640)=""/3) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000140)) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000100)=""/148) ioctl$sock_netdev_private(r1, 0x89f6, &(0x7f0000000680)="6f06ebd24ee080a65ec50234ce95764c3348a87d988ed2dcf580f01a702ac75f686867a260349fa232f6dc43ef5cfc53bb53ec7489420d9eda439990d13239d7850f0de897381da300ee9b906162a904ac3d90d96cce744d426b675e70f622fdba02edb64d68d6dd11365e") 16:38:17 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) r7 = creat(0x0, 0xbc9dc8fbd81cb4b1) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r7, 0x0, 0x0, 0x3}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r9, r7) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={r13, 0x9}, 0x8) io_setup(0x4, &(0x7f00000004c0)=0x0) r15 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r15, 0x40186f40, 0x76002d) io_submit(r14, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r15, &(0x7f0000000780)="56a40bea5635a9bd462b521ab6e31b8e22a9bddfc6587b154990afa41e681d03c73f2e5706eb91b29a4f4ae01979d9048c4d87fb2da00f0befb245ea0907f995e7d5dee4da1d257b9c20a14b9e08513288b65829e821cc110fa486b6c1e5124bd4807c67a22c22d1ccdd61eec9c2d10cc4c1e8eb6e70e7a8bf1b8feaa4e28f5100bf8f4aea6de2488470348edc339592a15395680e6e8b50500db2ef71db36f2c967d340af15711177f126c47b76d938c8a93df8cde361dc03b9ed88ec15d09b0c7d3365da20961e31700f0a6ce84964af80a749692ce1bddb", 0xd9, 0xffffffffffffff97, 0x0, 0x1}]) socket$inet(0x10, 0x0, 0x0) [ 218.551659] XFS (loop3): unknown mount option [inode6S]. [ 218.588610] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 16:38:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="696e6f646536532c9794bbc9a3e40300000000000000ff0f"]) 16:38:17 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x379b, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8000f1f63804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x100, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x7ef41f5c50734735) sched_yield() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) 16:38:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x18, 0xea, 0x9, 0x0, 0xff, @random="29828225d90f"}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$l2tp(r2, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x800000000000000a}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 218.790106] protocol 88fb is buggy, dev hsr_slave_0 [ 218.795263] protocol 88fb is buggy, dev hsr_slave_1 16:38:18 executing program 4: syz_open_dev$ndb(&(0x7f00000001c0)='/dev/nbd#\x00', 0x0, 0x0) r0 = syz_open_dev$ndb(0x0, 0x0, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup(r3) dup2(r2, r6) r7 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r7, 0x0, 0x5, &(0x7f0000000100)=0x100000001, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r10, r7) ioctl$NBD_DISCONNECT(r6, 0xab08) [ 218.902479] ubi0: attaching mtd0 [ 218.907601] XFS (loop3): unknown mount option [inode6S]. [ 218.916609] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 218.963690] block nbd4: NBD_DISCONNECT [ 218.982836] block nbd4: Send disconnect failed -22 16:38:18 executing program 3: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@multicast2, @multicast1, 0x2}, 0xc) r0 = socket$unix(0x1, 0x1, 0x0) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000100)=0xacb9ff1f223a9cd5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x800) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r2, &(0x7f00000017c0), 0x3a8, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000003c0)=0x4, 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r3, &(0x7f00000017c0), 0x3a8, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="28000000100001080200"/20, @ANYRES32=0x0, @ANYBLOB="000004000000000008001b000000000074fd02d766ff61ea0fed87e6b17f1e623002edf035b6f556dc7cfe2a24efbbc264d4f6194e4c51a9262f4214e2cb9208c80a0b75e4bcbf5d3d1938d79d50d894289ebb327162"], 0x28}}, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) setsockopt$llc_int(r5, 0x10c, 0x9, &(0x7f0000000240)=0x81, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, 0x0) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x10001, 0x101100) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)={@empty, @multicast1, @multicast1}, 0xc) r6 = dup(0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000000)) r7 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r7, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 16:38:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, 0x0, 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r2 = syz_open_dev$dspn(0x0, 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c3542ac42cb2f94b098e98f2bcd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xa943708f26830065}, 0x1006) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000001c0)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000240)={&(0x7f0000001300)=""/245, 0xf5, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001400)=r3, 0x4) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000082) write$nbd(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="6744669800000000000000006517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3202f99f16d06589e03469637a7267592938766010a35efd21affe2009efdc31a38e887a5960ac2022d45136803a9e841e84f03d05ebc7e87c10dfc8b2cf1fd84fbcd578bcd3e51a594acdea573d84d"], 0x74) [ 219.012033] block nbd4: shutting down sockets [ 219.086804] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 219.275627] ubi0: attaching mtd0 [ 219.282545] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 219.404478] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.413124] bridge0: port 1(bridge_slave_0) entered disabled state 16:38:18 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) dup2(r0, r1) 16:38:18 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x5, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80000) r5 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r6, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000140)={0x4, "476374cc8f990e647f6af6c7d040a5a5f251df4da367e2f6f49921d8a109e821", 0x400, 0x9, 0x9a51, 0x10, 0x2}) fcntl$setstatus(r5, 0x4, 0x98428d57a99b5f44) r7 = creat(0x0, 0xbc9dc8fbd81cb4b1) io_setup(0xc0, &(0x7f0000000040)=0x0) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r7, 0x0, 0x0, 0x3}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r9, r7) r10 = socket$inet(0x2, 0x4000000805, 0x0) r11 = socket$inet_sctp(0x2, 0x5, 0x84) r12 = dup3(r10, r11, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r12, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r11, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r12, 0x84, 0x7a, &(0x7f000059aff8)={r13}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={r13, 0x9}, 0x8) io_setup(0x4, &(0x7f00000004c0)=0x0) r15 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r15, 0x40186f40, 0x76002d) io_submit(r14, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r15, &(0x7f0000000780)="56a40bea5635a9bd462b521ab6e31b8e22a9bddfc6587b154990afa41e681d03c73f2e5706eb91b29a4f4ae01979d9048c4d87fb2da00f0befb245ea0907f995e7d5dee4da1d257b9c20a14b9e08513288b65829e821cc110fa486b6c1e5124bd4807c67a22c22d1ccdd61eec9c2d10cc4c1e8eb6e70e7a8bf1b8feaa4e28f5100bf8f4aea6de2488470348edc339592a15395680e6e8b50500db2ef71db36f2c967d340af15711177f126c47b76d938c8a93df8cde361dc03b9ed88ec15d09b0c7d3365da20961e31700f0a6ce84964af80a749692ce1bddb", 0xd9, 0xffffffffffffff97, 0x0, 0x1}]) socket$inet(0x10, 0x0, 0x0) 16:38:18 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) vmsplice(r1, &(0x7f0000000540)=[{&(0x7f0000000000)="f58b393b28dda3757794b90f213a35ddf68e8740159232713336cca7f4419eda6ce7851bcc1744b2cb9cb26d241ee06ea38ca5675ce161a189710df718626e9fbc", 0x41}, {0x0}, {0x0}], 0x3, 0x6) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x800000, 0x701101) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) accept4(r2, &(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x800) setsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000200)={@local}, 0x14) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) mkdir(&(0x7f0000001240)='./file0\x00', 0x100000000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='#! ./fil\t0\n'], 0xb) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/4, 0x4}, {&(0x7f0000000080)=""/69, 0x45}], 0x2) 16:38:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="75707065726469723d2e2f6790869e1d25aef766696c65302c6c6f7740726469723d2e2f66696c75312c776ff26b6469723d2e2f66696c6531"]) chdir(&(0x7f0000000180)='./file0\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) getsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18}, 0x18) 16:38:18 executing program 4: ftruncate(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000004c0)='./file0\x00') setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000180)=0x400, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000140)=0x2) rename(&(0x7f0000001700)='./file1\x00', &(0x7f00000016c0)='./file1/../file0\x00') r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file1\x00', 0x8, 0x3) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r5 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfe, 0x7f, 0x9, 0x39, 0x0, 0x4, 0x4000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x800, 0x2}, 0x1000c, 0x10000, 0x80000001, 0x6, 0xc6d, 0x4, 0x9}, r4, 0xd, r5, 0x9) ioctl$VIDIOC_QUERYMENU(r3, 0xc02c5625, &(0x7f0000000000)={0x9, 0x66c9, @value=0x40}) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000002c0)={0x3b, @empty, 0x4e21, 0x0, 'sh\x00', 0x8, 0x2, 0x59}, 0x2c) 16:38:18 executing program 3: rmdir(&(0x7f0000000000)='./file0\x00') r0 = perf_event_open(&(0x7f000025c000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 219.617069] overlayfs: unrecognized mount option "low@rdir=./filu1" or missing value 16:38:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'yam0\x00', {0x2, 0x1eb, @rand_addr=0x40}}) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x8, 0x5, 0x4, 0x4}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x10008040) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000001c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002702000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe3d640500000000004504000000ffffffd404000040000000b704000010000020620700fe00000000850000002e000000b7000000000000009500000000000000a41600000000000000b1712b4b29be0997694edf26355247085da646203847ea0e60db87d846546a79224b3f1e706b266ed76eea4aee3e1c304a9c4e88ec4790c3b529a7904f71589b8fc5db65"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) 16:38:18 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) dup2(r0, r1) [ 219.737041] overlayfs: unrecognized mount option "low@rdir=./filu1" or missing value 16:38:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x101ff, 0x3, 0x0, 0x1000, &(0x7f0000014000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000000)="f30f090f35642ef22e650f093e67650fc728b9f90200000f320f01eec4c2359994e1003000000f0171009a0f0000001c0066baa10066ed", 0x37}], 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0xfe) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000000340)={0x2, 0x1, 0x5, 0x7, 0x101, 0x7fff}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f00000003c0)) socket$inet_udp(0x2, 0x2, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r5, &(0x7f0000000140)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @remote}, 0x14) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x12, r7, 0x0) r8 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000002c0)=0xe, 0x0) ioctl$sock_ifreq(r8, 0x19b18, &(0x7f0000000300)={'veth0\x00', @ifru_mtu=0xec}) sendmmsg(r5, &(0x7f0000008a80), 0x400000000000328, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) r9 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$HCIINQUIRY(r9, 0x800448f0, &(0x7f00000001c0)={0x0, 0x0, 0x5, 0x0, 0xff, 0x5}) 16:38:19 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x4000, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f00000007c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b00000015631e63ff07c7b77f57671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca2d5c3387d00e339a2b12eda1921e4aad3641f65693b69ff63557f59665f1837e82b47d405b7a2c5fb9eea751d3a7e2f5ed4652a45e124f6f31f0fe06c14ed9d497ad4ac269c261fe1997ebf46d14c5465eae60a208ab357c2568962e0286e566c"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x40001}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x5, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000380)=0x9) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2404090b}, 0x10) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x1, 0x2000) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() 16:38:19 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$P9_RVERSION(r1, &(0x7f0000000980)=ANY=[], 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000001c0)) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) setfsgid(r2) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) request_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000100)) ptrace(0x10, r3) ptrace$pokeuser(0x6, r3, 0x388, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0xb) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x300, 0x0) 16:38:19 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x7, [@dev={[], 0xe}, @link_local, @dev, @empty, @remote, @remote, @remote]}) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000100), 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = request_key(0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/103, 0x67) keyctl$invalidate(0x15, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000002b36f85e000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f00000000c0)={0x9, 0x66, &(0x7f0000000180)="a1da5eac95d2b6ff16ecd4dec52b1832fa64652934ccb05d72bf456a9785ea5e37d9562aa77b108d1a9c6bc0e95ba041a2f16cc65e02c03b39f05ef43432e52f6cd6ff9eb6578ee9b5c96ab1aa59a2054d90d173dfaa5610e99ef0322e600615c419f3e04453"}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 16:38:19 executing program 5: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x4000000000000000) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept4$vsock_stream(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x0) r5 = creat(0x0, 0x0) r6 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x400806e, 0x0, 0x0) sendto$inet6(r6, 0x0, 0x0, 0xc001, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, 0x0) creat(0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000027000)={0x1}) io_setup(0xc0, &(0x7f0000000040)) r7 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xd, &(0x7f00000001c0)=0x0) dup2(0xffffffffffffffff, r7) io_submit(r8, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0xe1}]) io_submit(r8, 0x1, &(0x7f00000005c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x8ecd, 0xffffffffffffffff, 0x0, 0xffffffffffffff18, 0xfffffffffffffffe}]) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) socket$inet(0x2, 0x4000000805, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r9, 0x84, 0x19, &(0x7f0000000240)={0x0, 0x9}, 0x8) io_submit(0x0, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r5, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:38:19 executing program 3: socket$inet6(0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="340000001000010400"/18, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x801}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_GROUP_FWD_MASK={0x8, 0x4}]}}}]}, 0x3c}}, 0x0) [ 220.022847] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 16:38:19 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1}, 0x8) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r2, 0x800452d2, &(0x7f0000000100)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000040)) 16:38:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000025c0)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) chroot(&(0x7f0000000000)='./file0\x00') 16:38:19 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, &(0x7f0000000000)) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0xa943708f26830065}, 0x1006) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r3}}, 0x171) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x3a7f4a1d, @loopback, 0x7}, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, r3, 0x4}}, 0x48) dup3(0xffffffffffffffff, r0, 0x0) 16:38:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/159, 0x9f}, {&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f0000000840)=""/98, 0x62}, {&(0x7f0000000540)=""/167, 0xa7}, {&(0x7f0000000980)=""/160, 0xa0}, {0x0}], 0x7}, 0x401}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000400)="1c45fe9b23abc0bb06f8635e7a1f8bd41c0110904fb70ebb2c7f50af881db242d92049ab2c279960446558f8c6eb4f684962e30df241afae1c08135d13550aa3782c7ca1bd823c2190dff481e931bc26581bcc278bee41b681b7763eb9974cb38dcaeea6", 0x3528a9c0}], 0x14b, 0x699ff4b6d54cee0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x3}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r4, 0x0, 0x0) rmdir(&(0x7f0000000140)='./bus\x00') socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000a6e217b91c3b0d873722b41a118fd58fa1f0a39ad9582203daa32c9831699acc52f141eeca2bd32d2f6fb54e5bff40e062a43f80b1babfd076d2502892250deee2728316e63e589ddf142e89365bd48cf76602c6f6aa76bc37284732bd1e191ddd3c9f314e58c55b88dfd6718e0fdd39db0f827c195f3c4957c67a08466517ba136c8c9e01000000f8ffffffffffffff3e26b5ca26bb434dbd0e5085c22834533925db8b54b33da7b947aefca1f9c49c648d58d4f944264fcace71d5b384958a393d3fc241af8869c798cd3c13d7083a7eb4c526e072a23bd24cccb38e4eff542520858c940fbb95979a564d73a7af107fd5dd12da1838873914a467c3ce2805683be94559864317c0a1dac92d090f4f9093679791a2840f2851324acdf44a807e69a1bc25d265303004e8ead128a3d61c0063233501cfdf76d99dbc00000000000000038a444001c386475c432c7a6e898885429040954ea0bd29abc7b9322f3485d99ab38a3231ea08584795647ddb75c593933e824acdab292482735cd91572d0bc3f95b61e039183f5ed7cb75f203eda396b812380f315a62003d322e8f78effd376d0304715cacdb4994e24f8fc9899485be8cf9ace80047f40d952557777c7aba5d2e6096a65bb30"], 0x18}}], 0x1, 0x4048000) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='HD`q', @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000180)={r7, 0x7}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000380)={r8, 0x7}, &(0x7f00000003c0)=0xc) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000480)='net/udp6\x00') sendfile(0xffffffffffffffff, r9, 0x0, 0x320f) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r10, 0x40186f40, 0x76002d) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r10, &(0x7f0000000a40)="60ad872451b6034571c04f3b904412b534f123dfcc433312bb6d9e85ca3e8ac36fee023722006db0f0d30dee16bb2ba5739c7cac4979fc5909bf9f548bff981f7346872f042b8474f291d0197673baa355303658a84407056e1b694c403facdbaaaab96d4fb048120050939e8ee38cddc59cc2adaf1328a277f6fcea47f6f5cd4d2efc00bdba1207863f7c236b7e936f8ea43426412e728e4ea99f04d6ed5f90605109ab38a2494fccc26e13dada185a9b1affcb4e91bb977ad4e2e51b1516a30bf2fd9b1779136e534b752f4779f9246aa9c9eb85f5804f1817a4e05b207479", &(0x7f00000002c0)="c2d0d99b0166463b8c98d857b5ec787df47b4d310cf344509f32a0522f7494873440c6f99036e7e61e99c7fe19ba2799a7c8c0daeff7bd52eb9b6a6cf4d4035cff5fe025739a589dc719dfd92d72e75993ca510faa41931745552a2afd9a8a1022215f4ebd63", 0x2}, 0x20) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) [ 220.424577] EXT4-fs (loop0): quotafile must be on filesystem root 16:38:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) socket$packet(0x11, 0x0, 0x300) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) 16:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000000c0)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) close(r3) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000240), 0x4) getdents(0xffffffffffffffff, 0x0, 0x500) r5 = gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x60}], 0x1, 0x0) 16:38:19 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bind(r0, &(0x7f0000000180)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x3f, 0x8, "8e7dde9870a28a352ddd1df233192ae9a446abdb6f888707a6c822d3a792ad40acecf9b7a7fa78e52d9f347c0435950fbebfd5415c7b396505594dc517bbbe", 0x28}, 0x80) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)={{0xcc, 0x5, 0x8, 0xff, 0x37f, 0x3, 0x2c9, 0x8000}, "db4c4745934e42b63414fabd7c6873f0075580ec267002c0f979305438442a9c974cc580ba903cf6892440b9d010bc579a16cf9a7ea10ad7f9da14405e56e7d047f5a366b6c555b7358a7fb33b1dc85a036861efc58450720fdb5e209d26607e7e803590098b400df17f8292c45df0a07c0b448e41268b597ad142953ac4b537f903cfcce6f6889de3f43d07", [[], [], [], [], [], []]}, 0x6ac) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x40) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) epoll_wait(r2, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0xffffffff) 16:38:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000000c0)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) close(r3) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) setsockopt$MISDN_TIME_STAMP(r4, 0x0, 0x1, &(0x7f0000000240), 0x4) getdents(0xffffffffffffffff, 0x0, 0x500) r5 = gettid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x60}], 0x1, 0x0) [ 220.651808] device bridge_slave_1 left promiscuous mode [ 220.667912] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.693388] device bridge_slave_0 left promiscuous mode [ 220.727408] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.796915] ubi0: attaching mtd0 [ 220.809362] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) [ 220.823986] device hsr_slave_1 left promiscuous mode [ 220.849096] device hsr_slave_0 left promiscuous mode 16:38:20 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, 0x0, &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000240)) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$UHID_CREATE(r5, &(0x7f0000000340)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000180)=""/127, 0x7f, 0x2, 0x80000001, 0x5, 0xfffffa8e}, 0x120) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) syz_open_dev$char_usb(0xc, 0xb4, 0x8) ioctl$KVM_SET_VAPIC_ADDR(r5, 0x4008ae93, &(0x7f0000000480)=0x4000) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000002c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @remote, 0x0, 0x0, 0x5, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 220.872595] team0 (unregistering): Port device team_slave_1 removed [ 220.898190] team0 (unregistering): Port device team_slave_0 removed 16:38:20 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x4, 0xc1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0xa, 0x1, 0x0) close(r1) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="20000000000000008400000002000000000004535202ef00000000c8", @ANYRES32=0x0], 0x20}], 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, 0x20) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r3}, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) sendto$inet6(r4, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000280)='\x00\x04\x00', 0x40d3530309019c78) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000000)={r3, 0x9}, 0x8) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r4, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$can_raw(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x10) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r7, 0xc0406619, &(0x7f0000000140)={{0x1, 0x0, @identifier="d30d229a3ff2f7c0c5e6df55ab65b804"}}) [ 220.928961] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 220.965688] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 221.020771] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 221.026551] ubi0: attaching mtd0 [ 221.042581] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) [ 221.077010] ubi0: attaching mtd0 [ 221.082156] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 221.133764] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 221.259082] ubi0: attaching mtd0 [ 221.283722] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 221.328584] bond0 (unregistering): Released all slaves 16:38:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xd7, 0x0, 0x1, 0x0, 0x0, 0x3, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x3}, 0x3b1c1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00\x00\x00\x00\x00\x01\b\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="400000001400090100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="140006000000000000000040000000000000000014000100fe8000000000000000000000000000aa69a515bf95e32b714e769db608b4f33c82ef69590ddbcce00a41f8d89e3fd6aa9a0bc79061bf6ba6a036dd414bb9d6155e1d3e1efdb07f450141f7330cdf0916eb13e9443ec5915e8695c6855a83e24eb2b16c7bc55107b6830bf3220873f216f4565580f53bd2e51ac0687950f2a1de82298b18b8a79a88871a2c7ffa73b532ce1f84b1514898437ddeafaa0eabfee845f2be5b66c734baec43fbf99ad5a2f11e7f228e55e02565747f130582516187d471f9c800c2ca831e8bc87ba6b8ce66345ab6c91fa97833a02877"], 0x40}}, 0x0) [ 222.950163] net_ratelimit: 14 callbacks suppressed [ 222.950168] protocol 88fb is buggy, dev hsr_slave_0 [ 222.960317] protocol 88fb is buggy, dev hsr_slave_1 [ 223.190654] protocol 88fb is buggy, dev hsr_slave_0 [ 223.195777] protocol 88fb is buggy, dev hsr_slave_1 [ 223.438433] IPVS: ftp: loaded support on port[0] = 21 [ 223.509027] chnl_net:caif_netlink_parms(): no params data found [ 223.541889] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.548295] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.555222] device bridge_slave_0 entered promiscuous mode [ 223.562282] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.568643] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.575797] device bridge_slave_1 entered promiscuous mode [ 223.591518] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.600261] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.616451] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 223.623683] team0: Port device team_slave_0 added [ 223.628989] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 223.636207] team0: Port device team_slave_1 added [ 223.641562] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.648684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.667212] device hsr_slave_0 entered promiscuous mode [ 223.673658] device hsr_slave_1 entered promiscuous mode [ 223.679407] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 223.686354] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 223.698180] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.704556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.711142] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.717460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.743252] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 223.749339] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.757504] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 223.766419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.773831] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.780756] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.789650] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 223.795852] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.804616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.812294] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.818624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.827652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.835830] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.842218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.856479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.864217] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.873556] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.886785] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 223.896796] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 223.907104] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.913676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.921879] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.929534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.939672] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.949952] 8021q: adding VLAN 0 to HW filter on device batadv0 16:38:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0xffffffffffffff09}, 0xfddf) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) prctl$PR_GET_SECCOMP(0x15) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) 16:38:23 executing program 4: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) bind(r0, &(0x7f0000000180)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x3f, 0x8, "8e7dde9870a28a352ddd1df233192ae9a446abdb6f888707a6c822d3a792ad40acecf9b7a7fa78e52d9f347c0435950fbebfd5415c7b396505594dc517bbbe", 0x28}, 0x80) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000e00)={{0xcc, 0x5, 0x8, 0xff, 0x37f, 0x3, 0x2c9, 0x8000}, "db4c4745934e42b63414fabd7c6873f0075580ec267002c0f979305438442a9c974cc580ba903cf6892440b9d010bc579a16cf9a7ea10ad7f9da14405e56e7d047f5a366b6c555b7358a7fb33b1dc85a036861efc58450720fdb5e209d26607e7e803590098b400df17f8292c45df0a07c0b448e41268b597ad142953ac4b537f903cfcce6f6889de3f43d07", [[], [], [], [], [], []]}, 0x6ac) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x84800, 0x40) write$9p(r0, &(0x7f0000000800)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) epoll_wait(r2, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0xffffffff) 16:38:23 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040), 0x4) socket$packet(0x11, 0xa, 0x300) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, 0x0, 0x0) openat(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x200) r1 = syz_open_dev$admmidi(0x0, 0x0, 0x100) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000340)={0xfffffffffffffffd, 0xd000}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xffffffffffffffcb) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x3) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x13) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xe0000000000, r3}) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, 0x0, &(0x7f0000000240)) ioctl$PPPIOCSFLAGS(r3, 0x40047459, &(0x7f00000003c0)=0x100000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) unshare(0x40000000) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r6 = socket$nl_route(0x10, 0x3, 0x0) splice(r5, 0x0, r6, 0x0, 0x1420000a77, 0x0) r7 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000743072f62a3f7c9228c1874bac34999e5d658f4d22928bb54a3cc48e3ba4ab19fcd9579b39f4241b87567d7e1947ee5cecccc0dc6dd587852bf437fa9ae0c9464e01ecc1a9d379e021d612df83843631bd090b85312672f643993fa5832600000000d3a2d3af1227434a70aecd67ee6bbbb174fe3197e1e30f40029a25f2ccd0904f6a1e94e641a9452a07000000000000008b9f4bf896a6c9412ba5b76437974735b3ce09813e17cca3596c90b5675ec7325fa208bf000000000000000000", @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r7, 0x84, 0x79, &(0x7f0000000400)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000200)={r8, 0x7fffffff}, &(0x7f00000002c0)=0x8) setsockopt$inet_udp_encap(r2, 0x11, 0x64, 0x0, 0x0) r9 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xfffffffffffffffa, 0x20401) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r9, 0xc0385720, &(0x7f0000000080)={0x1, {}, 0xfffffffb}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1000000000000080, 0x0) 16:38:23 executing program 5: socket$inet(0x2, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:38:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') syz_mount_image$gfs2(&(0x7f0000000480)='gfs2\x00', &(0x7f00000004c0)='./bus\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) r0 = userfaultfd(0x80800) signalfd4(r0, 0x0, 0xb8a4b8797e5c25f3, 0x180800) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 16:38:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x28, &(0x7f00000001c0)='@,selinuxvboxnet1keyring.wlan0usereth1/\x00', r1}, 0x30) prlimit64(r2, 0xb, 0x0, 0x0) getpid() socket$inet6(0xa, 0x4, 0x4) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x545, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = getpid() ioprio_set$pid(0x2, r5, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) r6 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r6, &(0x7f00000000c0)={0x14c}, 0x137) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000380)='./file0\x00', 0x0, 0x1) r7 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r8 = gettid() sched_getaffinity(r8, 0xfc48, &(0x7f0000000000)) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76002d) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x141, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r9, 0x84, 0xb, &(0x7f0000000300), &(0x7f00000002c0)) getpid() remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000752000/0x2000)=nil, 0x2000, 0x3, 0x0, 0x0, 0x10000000002) writev(0xffffffffffffffff, 0x0, 0x0) [ 224.014468] kauditd_printk_skb: 7 callbacks suppressed [ 224.014475] audit: type=1400 audit(1571330303.215:128): avc: denied { create } for pid=9718 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 [ 224.050241] protocol 88fb is buggy, dev hsr_slave_0 [ 224.055305] protocol 88fb is buggy, dev hsr_slave_1 [ 224.109413] audit: type=1800 audit(1571330303.305:129): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16842 res=0 [ 224.150564] protocol 88fb is buggy, dev hsr_slave_0 [ 224.155803] IPVS: ftp: loaded support on port[0] = 21 [ 224.157245] protocol 88fb is buggy, dev hsr_slave_1 [ 224.170089] protocol 88fb is buggy, dev hsr_slave_0 [ 224.176252] protocol 88fb is buggy, dev hsr_slave_1 [ 224.236365] ubi0: attaching mtd0 [ 224.256499] gfs2: not a GFS2 filesystem [ 224.264506] ubi0 error: ubi_attach_mtd_dev: bad VID header (50331648) or data offsets (50331712) [ 224.275355] audit: type=1804 audit(1571330303.345:131): pid=9733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/92/file0" dev="sda1" ino=16844 res=1 16:38:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') mprotect(&(0x7f0000026000/0x3000)=nil, 0x3000, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r4, 0x87ca1d0bb5051b1b, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x4000044) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 224.323442] audit: type=1804 audit(1571330303.305:130): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir609955201/syzkaller.V382sK/56/file0" dev="sda1" ino=16842 res=1 [ 224.355246] audit: type=1800 audit(1571330303.345:132): pid=9731 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16842 res=0 [ 224.469964] gfs2: not a GFS2 filesystem 16:38:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xffffffffffff7cfe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) pipe(0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), 0x4) connect$x25(0xffffffffffffffff, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x40000000000000, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) clock_adjtime(0x6, &(0x7f0000000480)={0x400, 0x1, 0x0, 0x9, 0x0, 0x0, 0x8, 0x24, 0x6, 0x7, 0x5, 0xbb8, 0x80000000, 0x401, 0x1ff, 0x7fff, 0x40, 0xff, 0x5, 0x1000, 0x3, 0x7ff, 0xff, 0xfffffffffffffff8, 0x8, 0x7ff}) fallocate(0xffffffffffffffff, 0x40, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="75707065722e2f6668d48245d44f403110a8696c65302c6c6f77030000000000000066696c65302c776f726b6469723d2e2f66696c653100000000"]) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0/f.le.\x00') [ 224.519487] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 16:38:23 executing program 2: socketpair$unix(0x1, 0x2fa5d042b61b9be, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) r3 = socket(0x1, 0x1, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x8, @empty, 0x8}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @rand_addr=0x45b8}, @in6={0xa, 0x4e22, 0x101, @empty, 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) r6 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r6, 0x81007702, &(0x7f0000000100)=""/148) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r5, r6, 0x9}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:38:23 executing program 0: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)={0x9a, {{0x2, 0x0, @local}}}, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40186f40, 0x76002d) write$uinput_user_dev(r2, &(0x7f0000000280)={'syz1\x00', {0x3, 0x4, 0xfffa, 0x9}, 0x27, [0x1, 0x8001, 0x2, 0xfffffffd, 0x80000000, 0x5, 0x2, 0x7fffffff, 0x9, 0x5cb10248, 0x7fff, 0xe7, 0x8, 0xfffffffa, 0xc95a, 0xbe, 0x8, 0x7ff, 0x1, 0x7fffffff, 0x3ff, 0x0, 0x101, 0x8, 0x0, 0x1, 0x9, 0x1, 0x8000, 0x800, 0xf70, 0x3, 0x3, 0x2, 0x3, 0x1, 0x10001, 0x3, 0x80000000, 0x0, 0x9, 0x4, 0x9, 0x8000, 0x4, 0x5, 0x5, 0x6, 0x1, 0x7fff, 0x80000001, 0x469, 0xa57, 0x9, 0x9dfd, 0x6, 0xc00000, 0x7, 0x5, 0x6, 0xffff, 0x6, 0x41, 0x7ff], [0x3, 0x8, 0x3, 0x8260, 0x1, 0x1, 0xffffff81, 0x6, 0x5, 0xfffffffc, 0x8001, 0x7, 0x5, 0x4, 0x7e137833, 0x8, 0x3, 0x2000001, 0xff, 0x0, 0x1, 0x6, 0x800, 0x1, 0x8, 0x96, 0xfffffffc, 0x2, 0x7fff, 0x20, 0x81, 0x3, 0x3f, 0x101, 0x200, 0x2, 0x0, 0x7f, 0x1, 0x1c000, 0x7, 0x27c, 0x9, 0x7fff, 0x6, 0x3, 0x4, 0x6, 0xa7d6, 0x1, 0x100, 0x1069, 0xa8, 0x1, 0x1a5c, 0x2, 0x10003, 0xfffffffa, 0xc8, 0x8, 0x0, 0x1000, 0xf82, 0x10001], [0x6a, 0x0, 0x401, 0x7fff, 0x4, 0x3, 0x6, 0x804, 0x1, 0x0, 0x5, 0xfffffff7, 0x7, 0x7fe, 0xff, 0x7fffffff, 0x0, 0x4, 0x6, 0x400, 0x3ff, 0x0, 0x0, 0x8, 0x7fff, 0x3, 0x4, 0x4, 0x7fffffff, 0x7, 0x8, 0x80, 0x7fff, 0x8, 0x1800, 0x0, 0x9, 0xf3, 0x5, 0x4, 0x90, 0xd74f, 0x8001, 0x4, 0x401, 0x3, 0x4, 0xff, 0x9, 0x0, 0x6, 0xbbe, 0x2eec, 0x3, 0x8001, 0xf508, 0x41, 0x2, 0x2, 0x1f, 0x3, 0x7, 0x9, 0x5ba], [0x40000000, 0x2, 0x5, 0x2, 0x7, 0x4, 0x9, 0x10001, 0x5, 0x7f, 0x8000, 0xc01, 0x5, 0x3, 0x6, 0x13c, 0x2, 0xffffffff, 0x9ea, 0x3933, 0x6a, 0x9, 0x6, 0x5, 0x40, 0x4, 0x8, 0xffff6419, 0x20, 0xd2e, 0x6, 0x2, 0x9, 0x647c, 0x3, 0x586, 0x7fff, 0xc7d0, 0x4, 0x181b, 0x3f, 0xffffff00, 0x10001, 0x3, 0x1, 0xc65, 0x4, 0x9b4, 0x80, 0x7, 0x2, 0x0, 0x9, 0x7, 0x2, 0xffffffff, 0xfffffff7, 0x2, 0x200, 0x3, 0x6, 0x0, 0x5, 0x6]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pivot_root(0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x1000, 0x102000}) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76002d) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x8000, 0x0) syz_kvm_setup_cpu$x86(r6, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{}, {0x20, 'em1#+security'}], 0xa, "795be1d6081fc7e10a69a64443a2301d04f3da1973dc46c6b8e855cea9a73a1ca5357c"}, 0x3d) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:38:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x2, 0x1}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000000c0)={{0xe3, 0x3}, 0x1, 0x8001, 0xdf05, {0x7, 0xa8}, 0x8}) 16:38:23 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000040)={0xffffffffffffff09}, 0xfddf) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x7, 0x0, 0x9, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) prctl$PR_GET_SECCOMP(0x15) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x20, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 224.773690] overlayfs: unrecognized mount option "upper./fhÔ‚EÔO@1¨ile0" or missing value 16:38:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/36, 0x24) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 224.839201] overlayfs: unrecognized mount option "upper./fhÔ‚EÔO@1¨ile0" or missing value 16:38:24 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/\x00\x00#\x00', 0x2, 0x200802) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x135) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000100)) [ 224.905929] audit: type=1804 audit(1571330304.105:133): pid=9733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir875955256/syzkaller.ABS96K/92/file0" dev="sda1" ino=16844 res=1 [ 224.934681] IPVS: ftp: loaded support on port[0] = 21 16:38:24 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000027c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000001700)="043b2ff3ffdbb94bd6d12d3e17e3315902271615c0fb5336f46687974b361723d2", 0x0, 0x0, 0x0, 0x1, 0x0}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:38:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xfb) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/148) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f00000000c0)) connect$inet6(r2, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000100)=r1) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) 16:38:24 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x40) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000015c0)='memory.stat\x00', 0x0, 0x0) write$cgroup_int(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x2, 0x9, 0xfffffffffffffff9, 0x5, 0x0, 0x8001, 0x5, 0x5, 0x7f, 0x1, 0x5, 0x0, 0x0, 0x266, 0x3, 0x101, 0x1f, 0x1f, 0x0, 0xfffffffffffffffa, 0x5, 0x8, 0xff, 0x0, 0x7, 0x1, 0x5, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp, 0x8000, 0x9, 0x1, 0x0, 0x100000001, 0x1f}, 0xffffffffffffffff, 0x0, r3, 0x9) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) recvmsg(r3, &(0x7f0000001580)={&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x80, &(0x7f0000000540)=[{0x0}], 0x1, &(0x7f0000000580)=""/4096, 0x1000}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f00000000c0)={0x2, 0x7fff}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r4, 0xc0305710, &(0x7f0000000080)={0x0, 0xecdd, 0x400, 0xf26c}) 16:38:24 executing program 4: pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x6, 0xffffffffffffffff, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x100000, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') socket$inet_dccp(0x2, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:38:24 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000380)={0xa, 0x4e24, 0x136e, @empty, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r4, &(0x7f00000001c0)=@in={0x2, 0x4e23, @remote}, 0x80) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="f762443032b04c696e57c306e00b819f31606f78fcffdd79a461517e5c992fa25670b0dbd6e5aeee472e4aaefa00ee7c77d0d9ccccd2ba0744bbee9952b38d2025c58cbc474e19ab"]) sendmmsg(r4, &(0x7f00000002c0), 0x4000000000000d7, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000100)={'\x00', 0xbf2}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000300)="18aedcad00000000a616f9159a522dc92f08a159083e56bf796da9ab1f8d05b98c81e7bea124283038a92acc985ee1919b8723f2d54cfbda4772c121c1ac2898da34c5e05a754bd476ebf20745f60d08fbdedc744ed9b51167fae3ce6c2fae51aa2a8e4816a358fb57ae387bcd925674088d93edd6ea", 0x76}], 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsgid(r5) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x3, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r6, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x6d) listen(r6, 0x5) listen(r6, 0x0) socket$inet6(0xa, 0x0, 0x0) 16:38:24 executing program 3: creat(0x0, 0x11e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4005ef3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000012c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) sendfile(r3, r2, &(0x7f0000000100)=0x4c000ffc, 0x6) [ 225.108955] ubi0: attaching mtd0 [ 225.115981] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 225.129610] sd 0:0:1:0: [sg0] tag#5375 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 225.138444] sd 0:0:1:0: [sg0] tag#5375 CDB: Format Unit/Medium [ 225.144492] sd 0:0:1:0: [sg0] tag#5375 CDB[00]: 04 3b 2f f3 ff db b9 4b d6 d1 2d 3e 17 e3 31 59 [ 225.153428] sd 0:0:1:0: [sg0] tag#5375 CDB[10]: 02 27 16 15 c0 fb 53 36 f4 66 87 97 4b 36 17 23 [ 225.162333] sd 0:0:1:0: [sg0] tag#5375 CDB[20]: d2 [ 225.213074] ubi0: attaching mtd0 [ 225.216782] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:24 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequ\x05ncer\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000840)={0x0, 0x9}, &(0x7f0000000880)=0x8) getpgid(0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000000980)={0x8, {0x3, 0x7, 0x0, 0x4}}) syncfs(0xffffffffffffffff) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f00000002c0)) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3, 0x4061}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) 16:38:24 executing program 3: creat(0x0, 0x11e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4005ef3) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000012c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) sendfile(r3, r2, &(0x7f0000000100)=0x4c000ffc, 0x6) [ 225.379443] ubi0: attaching mtd0 16:38:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKMODE={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)=""/215, 0xd7}, {&(0x7f0000000280)=""/200, 0xc8}], 0x2, &(0x7f0000000380)=""/184, 0xb8}, 0x81}, {{&(0x7f0000000440)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f00000004c0)=""/149, 0x95}, {&(0x7f0000000580)=""/156, 0x9c}, {&(0x7f0000000640)=""/56, 0x38}, {&(0x7f0000000680)=""/10, 0xa}], 0x4, &(0x7f0000000700)=""/4, 0x4}, 0xf}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000740)=""/160, 0xa0}], 0x1}, 0x2}, {{&(0x7f0000000840)=@can, 0x80, &(0x7f0000002c80)=[{&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000000940)=""/135, 0x87}, {&(0x7f0000000a00)=""/184, 0xb8}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/174, 0xae}, {&(0x7f0000001b80)=""/226, 0xe2}, {&(0x7f0000001c80)=""/4096, 0x1000}], 0x7}, 0x8}, {{&(0x7f0000002d00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002d80)=""/200, 0xc8}, {&(0x7f0000002e80)=""/77, 0x4d}], 0x2, &(0x7f0000002f40)=""/133, 0x85}, 0x100}, {{&(0x7f0000003000)=@generic, 0x80, &(0x7f0000003200)=[{&(0x7f0000003080)=""/252, 0xfc}, {&(0x7f0000003180)=""/107, 0x6b}], 0x2, &(0x7f0000003240)=""/48, 0x30}, 0x1}], 0x6, 0x42, &(0x7f0000003400)) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000003440)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r5}}, 0x171) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f00000034c0)={0x1, 0x10, 0xfa00, {&(0x7f0000003480), r5}}, 0x18) [ 225.417059] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80020}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x14, 0x0, 0x10, 0x70bd29, 0x25dfdbff}, 0x14}}, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="6653070000003639405cb4aed14e0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f91f828b16bdd45dcdb0d79e65199615607672c59957ab35f4ad614fd33cebbc150bb7dbdabae1775487b2b2f710c2b03b5b2461179f5f90bba001b50c09a6218a8106df2858ec973328e5a2c078a3fe3b52020203517e65ee74e82ba80a0fa881e689f7615baf78f0859fc000060d6a0b61193d4a1cb622431d42fee5e91531bfdfe5cb19ff15d6d891a92efa823a3c231ea82fdf0e7fcf567bf50600a2434362f56de8c859fa668b046005fc1e41eccbab4c0e594193f4e", 0xef}], 0x4, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000300)={r4, 0x1}) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="ff5bf5466b1a9f7111f76181905a6022ef2f48"], 0x7) lstat(0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x3}}, 0x0) 16:38:24 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000780)='/dev/null\x00', 0x80000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000033c0), 0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000100)=0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000002ec0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000003400)='./file0\x00') r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) io_setup(0x3b24, &(0x7f0000000740)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000003440)="227320e18804fc6d450514bb65b6a1ff1869b269831d6550c547c7c87929948c2279badcef177f014fdf2bb6f8ecb524f107fc595b8adb2a7e20a41f88552eb0cdb66101d8a6fde92b3714a7ba4eade284651c054530acd2148f4eb482a8a966b98100a9283e27f8bd99eea33a5a9559351f3b099ac51605bc02a64da9cd55453d6ad7273e5a5c4131eb56967ef6df582b3b45ed2f1737b56d3cffa55be0b03656a8a8e6e73d3393f048dad12d45aa31916cc052f32915fefa94b32d9b063adf9003c02e29d957204acd9ab845b20f9b6e", 0xd1, 0xffffffff}]) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, 0x0, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r5, 0x40186f40, 0x76002d) ioctl$TIOCSIG(r5, 0x40045436, 0x25) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r6, 0x6, 0x1, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/ion\x00', 0x40000, 0x0) sendmmsg$sock(r6, &(0x7f0000003280)=[{{&(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @broadcast, 'veth1_to_hsr\x00'}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000240)="09bff375848244c025cdb70d37e52e7c0b45f9761c0b420204c11201c79597e94ca886dcf65842aec6563f703188a83c4536356123cc741caad91a4145db0edd9893", 0x42}, {&(0x7f00000002c0)="43c3911a4dc44e71da42f2f0c9022a66c2e64a16a7d33e74b280692578d697aef1a6702774d10a0d081a21e114ad6b8ba62ddd3d329f2eb64bf1698121049e20dde8c574490a8409f00aba4f2b9304e3bcea01", 0x53}, {&(0x7f0000000040)="3c1d438834ae5c9ad45d3f7708bcfb47f79d74dcd09ccf779759887e1e134cc3ff1b4a147d2b474a1134", 0x2a}, {&(0x7f0000000340)="bfa02c00f3b6b682a657bd295208ac54ac7ba4146c978216103c15742406de01d358b5d36219b381024ef581c76c4546304c8f2f5493a11d535fbcd30d17ace9cd1b8b22652c1f3661", 0x49}, {&(0x7f00000003c0)="010c110ceb7c9810fe7175d7719ab0cfbb35589e14dd1fe582d817438af08282bfe886f42d3e90044e10e34310a262a7ae74ed7851ba22dbbc07982eee527426f4115e2f033a67e2f387bbad07004923d788b0dbe7034ecfec73e0704dac1a18224467611346b0dbc8f23d1af7d77ef2b3ceb0836edf9152ebb57e65d1f8456ec7cca3193b2e1be2fa07f298a5f2a8547a9536d64184a0e65bba6ac5c5467ed4094f9961122b0c9f6b", 0xa9}, {&(0x7f0000000480)="51c71cc89de041507f95cd76e8ba99d17a6a46ae3d0a7ce0e5820f79", 0x1c}, {&(0x7f00000004c0)="724cd403432125e6e358135b02400c2e3e87a9e2021afa49afde0b43801d5fa71fc323c43b0085ba44029117d0b3a54145097c32da9f4b4e3e884efa158d468631bfcc5b428891a211abb67339918d9e849ca66acde299fae01de390ad1158cf73d556028d2b1a", 0x67}], 0x7}}, {{&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x0, 0x3, {0xa, 0x4e21, 0xd24b, @remote, 0x4}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000680)="7064f22eb852b6e163712e82512c39a2be", 0x11}, {&(0x7f00000006c0)="5d8920d62df99316f960f398b28b5dbd66007d8cbc3df9e362a81d0e1661e04d7e15c21598db23903e9bde2cc6afbfc0d5e43619a88654b130ff3277c7addaf447d83584c2da241bf27e09678c26cff129f006186a51cab69ddf", 0x5a}, {&(0x7f0000000780)}, {&(0x7f00000007c0)="1b834f7946c841dd9a227d3f41920205ab2603e1f4fa3044ee3aba1dc37fa4cd91c591331ac7226d8c538d66804a940edfb44eedcc43c92c887cf5ad4b35e54f8c4fcbe0d013a4afc1b11a8ed3c09ace39d3b6f2c6c5dad1c1cad8cafa71616cc824f386720a65664e8fc3e2e072236c1a131000c98715abf1458bc906ba45bdff94ca47103df97462a3d0329c88b89e91bddf87ee7cc7e71c9b5548f9f759206d485605f247b43f25b3d4e716aba03b147f65dcdec62781696e86e8aa10ba61f8cee3701378ea01e4acccf596c73dc850", 0x46c}, {&(0x7f00000008c0)="88794b703c58b400702e11d30686bfff0be5a04b89aef1e645773049d3d92a203a413ff51338edd033303f0b1f44d201205dea70a94533537d36e26855bc6aaa33b18e062318f6878fdaf41531b7c56e14c516820bdb5b3a1b7994dcd35f3c7aeeb3999cd8d302cb70fc2a7a90ef2e95fe34b515018cc017d231183e62e8520bedff512b58a4b435881c7078d97c53d4526ee59ef58505d84fb4b563fedff4a72bb4506fe28169622e2fb1acba1428", 0xaf}], 0x5, &(0x7f0000000a00)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x18}}, {{&(0x7f0000000a40)=@l2={0x1f, 0x670, {0x9, 0x86, 0x67, 0x61, 0xee, 0xd1}, 0x401, 0x7}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000000cc0)="672f207c94b61c406dab93173fde025b12fc0f207bdac155e14a32e5a56444c66a2465635dc925bd6822703a68f278c351b00e30d18ed2f4b05819cd57385607d09f5c91eea60b9cd18f3e19404c19c7534ab55d83607e18d103865741cda10145bd364e9bcaf968d06df4687746813e5322e8f56edcb509e3ff5412cf8c1be13b8ef140ed546a970799e7c9eb52f5d973c123f90334c1b26198d32edcec4dd6e3f6c78b221b9edc5d48ce83b2d4d8afa3c958f38146288f120e6f4d22ddc270e8e9acc33d91600802f5e00f7c41516dfad34940f8573f3f549f6f795e8347355a44726664a2aa381431b6bb8eb16715e923f2c4a33b13d7249acbb36b8516f2de5d0c4621c53b38afe553d2d4595beefa6de96639944be6877ee88c8ba181d28eae84c8bf0d98a0ddcfc6f9ccc2009a0e641cbe83ca127cc25b6a25798ea54cab675baf6be60d37d18e1f414fc1a6dcef7bb016f2e674ee0de508291b25f8e5bcea12f226d42d62c75a7cd1c87d255602b6ec4822a250b867dc5395b401f57224999a193e41b5e0291d409308e3c408b26ebe314b0d993d9828f6d13a9498292df0f8056258f12b5d95496235ff04445d73d0bca054d3644a710de405bdaf34eabf43edd055a5650901c208eafab0c43b59e6d73dce808f9e002996257dcd1285cd05617e5b3f914a419ec0a4b727fb6ae360e2df3d1efd0c669f9b5984366dee39d7a728a11b077f504f1b224e077f550c8cbef2dbd964d6f5350ca74ca6e3025617b456ad0819425c2daa22a66df2845a45ed9e402e0391bd8cb6960ae2291b729a8fad6768393c1060a1aca88921e6cd1d06d7949529048db78756b2f20e0c10f745cc0e26e19aa0fc47071d800be1cc0b8dcde72a0eacfa3f21360d43907a671a4911475fb9dbd816bc872dc4462232c96ba71136653843eb98cc5eea95a70effacd757aa6accd641371d535cec73e24e7b66e071c32ee3ed8a2fd6014a0294c26c869abca4d23fda852b87fc0357d3b4b1c9855e89645e13919505dcec522d99d42ba866882885c915e81a5741d3a8c70896400ea12a1d707aacf18d0bf1326e83fe7e1a7c46dbea516f3233da37462c58ee51312e16ee9e71f8e4bff06901d0ca4f53e4db59b605b14df9baa1b64b96100c96ec5cb9b1d58c2e69dcc836f7c0a9904878433448781b67fd1fcc4c0d363dcac03f8dd408c3cc27c29b677ef3143ecb12cc450e58608be1b1a1ed7cf57630d918f5ae5f832d88e988f00fba6694ca9b658807de73f30be436a752f497269e1423c4221445fd8f4b2c7970ae7ee23451b54807f458843a59733bd9105824f2934c46b750d5ff5d5c163818d685d474509343391dabb5b608552d0300eedce40ed752238026d48f8620fa219cf1ecf3f37f6588a6a4f21c74590d8e5a115ee5e1c4e5feb01f5603a981438432cbae2a61876c6b367380a57ab135eb7ec2ee0fd7d1e264ed54c0ef0f1f661e997a33fcad94b63b2fd9f7886ca9a9fa4a4fd90d99cfe283dc834c2b2e1b0b3f6fbbad156b4c28369e57727943566546ac97d9a0e7af4685aad3e4d1a09e6b0e0523b55fdfe5c7bfdd2323e61a2f42f0740bb2061aa576a33b446407d78895a34393aaccdee132380b8d2e4f2f577b7569ff54330aca681ac46b2a8916c65fc2c48e26d3067d5d013274e7a938d44e603ecb85b9c8e7de4d94abe0dbed4c8147e9079df100ba2ee0584c1c077bdd221ae4e113a25c7aa2f0335cccecc34ce5a76a1a38ed2c6e902efc96e25cbc4b661c54665c940529e59ecb913cbe7a5fefb59c5abe363c8b2fb2d5f2567457066db7678147140bd24a9b4f24fdaf7c7bfc3780402f75a99375b4a4c8d9eb770c23bdf24e2cfd820c1d1a99426a8c8e4895fc28e32304b5ff580b08a6983545855cdfe737c443567aed52540ed21f6bd16157791a1ad81e012b8d6094255404d479a254327ba3b01013deae7b951ccbda1fabf244d50159fe81d05940f5b100912a4cefdaa3b763cb3debe9e1195cb90b1fb16c2aa9e47b830d9c623d8791873592abcffbccf093450a3109f6400e6bd43ccd54520951cb952ceda5f437c18c8e3afe3d60387609f6688e6385d405906beddc8079abae07e58180632668b1226a9ed93e91b94c11f090a474f9262d8836bb149b369aae494e30daf74fcc9632b538000dc04c518282437f87d54fb38b901e443d3cf598a84f0b684605da0604a97efc265c253d4dfcb7f5da79575f0c712dbfaede42207de894c4bf8b5edfe69cd7f00d86c905c99bfd082a5faa42b7890a8fab966125cbc2e624c5d4b34cd1a1bce01a682af1a9006618e1208435736af2131d882e2938664b43b7a50402c674d469fbcb526ed13c815d54a66b24cc0cd09a079cef0f038b01dc425c5b5db31f52cb4846ca9093c209b770470f2730f34398cf855aabd65b05e8552ddc5b3dadc4b1d8065823f74238673109fc0e4a22327d91e82d17583b2e741b91d5045d0be056dcd4acb67970ff46ec8db07e77822c63676564bfca6ef2c3195ba25f02d797f9e021ef6396279bc586d72bb9e3b3fd2208abb24d0bb1639bcca4dcca90aeaa032551de52124a3f3ec513f19d52e951e9175e4a51acdd2ab38cbdd514ab738e81260b72474a63876056fc4ad93fd551734bcbbd0691f94dd3fa81d4014824417110f3aa6df7165e3648c3842fc8cdd93c2149ded3851fb50ae1ba0cfb429628e4614a86b1365581e5852232924b5b70fc4d1fd0086e29488a03eddcb1aa29ecb8d1cce04589f1dd56ea147bc62f1476cbe6631ee891be4f694c969b13fba99598ca4b290bbcea39b364ea49a7355d59b6f6ae08b222781292a827bbfd9f756e2158359f90e29627185535ee8e0f7cbc4d8185b9283a860c6284731f38b40a2efc5e3356f704d59ffbba5a690e333fa4eb4be973baf9c21540babd99b7471db23b824121bb43743fc720a1a96c367d8a2b7cd1ffe53794cba3652dc41407f0c3907bd0ab5b413d829eadb2eb5e4b67882ab7c1babc957b3d7eb022927c8f77d65f34981d4089d479d4a84934609167687ead068b52bc037ea53b22c988d846caff9946862bd03c149083391a186d6f56d7c3a46b0499cb194070e401182e224c7d83162499a36b3273eaad2f933bb4b8984e33f1ac087016a32b9d614d68ebf590341054c7e9f7d7318ad0cb0f7eeebcb321f9756172082df05869ec0f1c0ac65482481ddaefa4d56639144b8709700f76be4744a31be4726974b093a1ae614805934c154cea433e7da9939a4f2bf8a2fd81b9df2c520abdf52896b5a7bcf8f17df2a40d6afc322a464ab6cbe3da799b4323b0587af772e85b59f6a5077716d467002987785536dbb73116ac3c9634542bf5df9075ca34009bf94f11ee35e360684ba62450e33141c355dbdb76308c9ade0ae6e628f1ec6f45788514c50e3c6b8ecf8b589e9dfb4243b92dc01c722a30e25ee4973208faf0a04d584dc58bfbf07de236ecb567212b6f3cbbbe41ee80969749401db593f03f2cf4beaf78b87c26c98bf9a0e9c267a65f67afcd291a412817d912e4dae79e01b8eb96cc0ea5a6d21efea8aaabb6f3edb3128bfb376b8c07147352518b04372ed95415c5f5b1f629e0429f8dce95f93b5c7ef077c2b6242d2f68b135a70b3aad8a1344a795f8c1906c49abc49b178bbd22df723eeb0415afe72cfa572fe20fc4d26d05b36b58489bf378c3403a101e8a3d904784b583346356ecba51c2ff6299602a504e6146c531b25f4bd7954b6a2fbaf6635e452ddaceac51be611e12f871fb80ee932393e2c71d1f2ca22a9c30b390e722f14a429968e85fcf719033689fa7717d41c80c35baabb30a40d9708b999d5338b6992c1425a83e9cf28130a49fdb92cf374db8c4dfca306680a68a0cc5e876291e41e020fbd3cf174c5ded410ce1813138a670e440c25d603db517fb2e85f206af397dfc7d96c269ac4476d0345e9814a32a5ab80a8a2a98ecf4f736ab188784a901aa6a8e7814344b963eab9d66fae03ddfaeacb56140bd791e9ee26b385bdf532583b575b265be0c36a3447c158bcc815af5cb6931304ad546d4b876fee6b98dbddc68be593bbd675c1f8288ffee24e93216cc3af6a202063c063de042f3c5a07a59e8c2b36c3e78299f085f5851ab0a1a3d1e58c1515f295e503c3fbcb24cd26d9d2f25ebcd77a69a9c848b0d868c29696117006911e748c7c70f1fd0bd1eb9d8fc6160af8b43800a0d702793ed6426ec7c8d7c714f62ecd6b37268f5b66e4567d953a2eab1168e7292fa523e6d8aee2d7e4bafcb5f28b6ea592f84c50f424daad0a1c79fa6f59346b0089c7cdd40cc3b356e7960ccae1e1366a1407119565592abf05053cb474e7fe537629fd736fc617ed1331a71b51d0efde40b0516c7095820d6c38e74259860bda09b57cf28edf9cc56d3735a1069c22a90f88ea08704ede7fddfdd8481d6d97e0291ca13acaf3eb3054900f9c98bfc555ade07ef66e6a05744fba3a8d8a91276b3c8f3879b5a993cea540b5e31d98fb55c2b3fcb90970f2fed0685bba88f0b6e150fadc166b72bb538239eaf0db2b6b826c21c540b41ad9ec46eed2362aa472a606f4a210c7f009d2e13bffb62d8cb753d2b1df64caa54c64b3ace30b080ffcf256ee9e44991d949a170c11653402ba2468b39605fd431c6e6340f9bd1b9e952f8d7f643500a5ae08a4d7aa9e6cf03d249a5efb594d9f94f5a16b8fcbf304fb8057cd24150a30e578abb80ba4ceed88caa1fd9c8f678dd827aa50331be120a4f0ac68c364e6e7a3c619921efb1daaf5cec258e5e7e626bf64aec95dd0754df935fef91a244b15ea5f18709767075ce0f291b194ebcad5aa8427d5d34445fcaa8f3c1d8e72d45954c0ca53c6022f647f5e2ec24d3dbc1de4eb19cbac96a687dd43172b60b4ceb8dda991e36cf90ef63c3e413f5664e24939373925e5c1669d1384126b1413e3e587ad8bb10ef2a9eb0850aa3630fc187d8e85fe280fe738c77d4d4967dc90166e7731f0c8c2d590fd13c0ee12035b7b62f096f8d3e39bdeedcb02e5312c68ac83548c64f45f6e39880f872c89414fd2807bb413ad8bd29f1dd74f9dc9354dc805687cbcb651ae995e3c221fb334087b87d61f9756c9649be80d2dee88d63b623f6293145042ce7a86b3ad4d0d5ce84f93f1b04003f1783f88ab7f96803ce2ab997d970aab944fb1bba81d3d008e7f7d75c4ff5455351c4ef5a0572c9f2504b1e2b2bdc5cef1252525dafb3f8d7a0f185666c109b1a61f982b4e89139bb4cc1d58d352125f7ca332d920ecdc0133d103ad28ab977a2b7a66a6e6555af26a1168dd899dc748c28e813bf2c1748161728de959c757b64e9993c15644efe2bfe6a5ac3c23d6b40b1d80242d3ff13610d601196d479a4c834bc647de64bbca287ede26c682c0e3c4ceb74a603724ba81d073766fab6b373a8a02bc3e168bde9a193fdc535cf01353b95f5661aa016d3dffe3047a1c19afc169be86408300ae07dd260011fd2bb8bc0d77461c75d1749ec38e8e9dc5d40e1d6e5d1fa6411ca1326d9dfdaca687eaa26e686cad45de81d98a72409f1f028a778754bd3c0fea511588b052ee70a76ff9f3f9c7b05254b92e9c829a0a6d0e08dad255da26875402f260f6bc2c805318bcb3ba8dfa00e1f9739ae2ccbd822b702fe1f13c0f2fd5e6258ef6ee0c412c3ed132c757998816ffee34f70351a163aa9d088b2bcb2eef02f435dbd2aa242b1dc86e0e032f75072d206bf49a8755ff735", 0x1000}, {&(0x7f0000000ac0)="d77446b51faef9eeeb30f3af7459241f2861f94023f0ab8076e0fb8a6a53b6bdade82a248ce65c60b13fb6c7a39d4750b1ce84cbcdab286ce625174fffa8c70dc93bb11de0d546e6a367ae4ec755256c2573ea5140", 0x55}, {&(0x7f0000001cc0)="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", 0x1000}, {&(0x7f0000000b40)="0e7bb68cd9325e9237535b3eb96cb06c0bdce138aa010dadf481304e207a4ef84665b399c69e8d502c6ee8e642f801fe658963dc99a0e3f466f63db7c317c1d46a20ede70c33770af27bfd91fe5b1b247e67dccfc842bf7ff72e8c3e1a29b208173840dd660955fd86d26eb2f7b21514696f77d066cfbe704b056abe6d39bd6e3d53b254eb01592130fded6106f7683d5b338bdc308217a4ff181ae1140bdfd4990f8493a2aa25d1e95b906880ccf1c3c4c4be129c65aaf2e1fb3f2f8fad3f5d4fbcbb3d4597aa49709f086a35ff9ee3d405490d760c8ef9ff2cd4ca33e4d43b296b4ae7321881def7b65ebaa4da789df829", 0xf2}, {&(0x7f0000002cc0)="effc6b1e6f1a04e28d4e7a7131d7dd19a3f2046c84b69f372e1716faa82e3eb3261732e081ce04dd72f3f99d6cb18f43beba0748812b6f112ce1be84d906ab48b6b0cc28377c971120394608c8b93dcd4796831fd6d0ae6d4d7fc078e427c0eadcc2c677872bc8e948d3f8a4aecf65aac2a39c4fb3579486be161224acaf3657452c2cb81ca2e611e67fe4ec557451c5d97aee2aa55c89129fb016e5899d693a87d97288d4", 0xa5}], 0x5}}, {{&(0x7f0000002e00)=@pppoe={0x18, 0x0, {0x0, @link_local, 'bond_slave_1\x00'}}, 0x80, &(0x7f0000002ec0), 0x1, &(0x7f0000002f00)=[@mark={{0x14, 0x1, 0x24, 0xb}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @timestamping={{0x79, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0xa7}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x633b}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000003240)=[{&(0x7f0000003000)="d43c65178ae15dabb10a8117c7834d356e23e009275fb13e1a24f55c77be9ca2278ccc11b84414302f616b3f8e3b2e7001f3486efa19d3c5e43599b4dfd585e67966b76f981d7f02780fd4b65c78d84676d4e595599ba002e4de12e4e56e4f310df1a8cde1e4675c20a1d3731a36d370aa9cb192cbee8565b632d75b80e29dfbfac597c3102dca452561d6fd8ac43656302d9634e11d2d0ebb5fd77cd397a013e396f40e3269a157ff53a4730ac322c01e4e4bd1b9be51c53d718141621448b5fc7509dc6f6e37", 0xc7}, {&(0x7f0000003100)="50ac26175da20dc52ac8d2923c11f27ad5569ee6880a3f66231a71fdc0496c2f3ba7a871eea6039f031dd82c77cef3a92e0f10fbc1cd85d1bf70e1d569a6f0cabd971c76df9cfaecbe430f413f184f8b831f0ff1a46fdb5e204b28977ab520a87370cda99679bccb7ed17eab1d874a5e78813937696d24270a7b4f7be7d7a3572893514b86142a3821bfb71a48ef13a5f0933a357e838e2c84b1be90183714041758edad278dff55882cedb8b516c96d2093ebfe28a337669fd18f330b40e2b2eefde365a5e808", 0xc7}, {&(0x7f0000003200)="12c3845fcce377e92236746cae755ac3edfdbf1320a1dfbc68290bf1d9bc11e238d8c62b6a9e04ba5993618bfaa527be598e77", 0x33}], 0x3}}], 0x5, 0x80) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socket$inet6(0xa, 0x3, 0x3f) 16:38:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x0, 0x0) r2 = dup(r0) ioctl$SIOCNRDECOBS(r2, 0x89e2) fallocate(r2, 0x24, 0xfffffffffffffffe, 0x1) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x600400) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1f, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f00000001c0)={0x8, 0x0}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) r7 = add_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000680)="e76f64b1c746e5072cfe12e74a2b8899fe099dd287fd1aea076ccc5f165d4abc283b3ed7ae33983305ba98dfd4be6eca87f66209090aae4869973d7049fcb687fe144a3392c60665004f00c6b61911a38da2724bc43315098e7782eafc1ab68bf9391959b2cc3cb058dcae8e685e741fa3d87fd4f76a2ba89747a38d707864fd24f2086edc65a8d69900002ae57d8b90c0fbb0bcca165694bac047fe378ab4dab6a58cfa389784b8842211ff6c7edc8ef0e06cb1b47ca79335b878f241b8af81478f67e76f65dac6691f70a9bf95b43ad527", 0xdda5, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000340)=[{&(0x7f0000000540)="ca543c66953c93be41eea2e47332fb690c884e734cc29b4bd1b670f9eef6dd906dd8901343bfc2e6387fe477362d5d5a5cc74949f91f7436295adf08c794b19b2e317b0e47b34b940b8f087942dbeffdc203a9b470a0568bf26ae3de8285cdfb50e6f9f3e1025129cf1c894843e033a437ae440f52e688002fe69d0a44a8aca567bd89cf988c9b435b948d86b1721f808d0a945af08aa5cc64f586532691660655635d64a47e83c7fc342a59edd3158ad77015fb0d997a68916407e44a74342d560f65db0d0805767171d3a8a8929d0263ab7b69708de757f7af19fb", 0x2f}, {&(0x7f0000000100)="f02137aa024cb87cc2c8a3f09344fbb33bd200f1a3b872bc6a6e7481a7ece4bf10f06d63c033949c6c1356e435f28d26938d1e2ddb1693332e91a13959429b8598270eadcbdcab6d77381129b5699d0d5429120bab64", 0x56}, {&(0x7f0000000200)="cbab7f8aab5f7c9ccd4211fe1bd8d387571588733c47e6d15475bcf357d27c3806ca1d66cbef276429cee3df9156b953b01581e91dd4af7e18eff76e0f56c37043484dff7958b3a649670c9d64e8751b14", 0x51}, {&(0x7f0000000280)="3b0e", 0xffffff7e}, {&(0x7f0000000180), 0x3bd}], 0x5, r7) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f00000002c0)={0x43, 0x9, 0x2, {0x3f1d9153, 0x0, 0xa01e, 0x7fff, 0x8001, 0x0, 0x0, 0x7, 0x5}}, 0x43) [ 225.479255] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 16:38:24 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ppoll(0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3be) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) splice(r1, 0x0, r0, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000100)=r2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(r4, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(r3, 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) sendto$packet(r1, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 225.560568] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 225.582317] ubi0: attaching mtd0 [ 225.585731] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 225.682612] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 225.705675] ubi0: attaching mtd0 [ 225.709281] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:25 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000001c0)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000f7172943db6c10"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f00000002c0)={0xbc, 0x6}) 16:38:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x220102, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x8, 0x0) writev(0xffffffffffffffff, &(0x7f0000001800)=[{&(0x7f0000001580)}, {0x0}, {&(0x7f0000001740)="60fa4386ccbd02bab6ad6c9f674a96259773ed46700d15e6361184f1c080e339514fac3c607fcaa963a87a091d616c4be03f80723ee1661293fde363290e48c81b1169160db9a76d23adcdbf5029f9c4e727d71fb2d56a23055797cd0356c8568289c442", 0x64}], 0x3) vmsplice(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000001000)="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"}, {&(0x7f00000000c0)="3c3a4b3d780551d79eeccd37fa59a322965f71055ae0e3cc1397960080020032e6385700000000000000000000000000000020000000000000000000"}], 0x25d, 0x5) 16:38:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x80000000, 0x80000) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f00000005c0)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000380)=[{&(0x7f0000000980)="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", 0x21b}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r5 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r5, 0x81007702, &(0x7f0000000100)=""/148) sendmsg$nl_crypto(r5, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x100}, 0x1, 0x0, 0x0, 0x90}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)) r6 = creat(&(0x7f0000000580)='./bus\x00', 0x0) r7 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) setsockopt$inet6_udp_int(r7, 0x11, 0x1, &(0x7f0000000000), 0x4) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) getsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100), 0xfffffffffffffdd0) fcntl$setstatus(r6, 0x4, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r9, 0x237, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r6, &(0x7f0000000000), 0x377140be6b5ef4c7}]) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r10 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1f, 0x480, 0x82dbe9353d8cc8f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20}, 0x200000000, 0x2, 0x0, 0x0, 0x9}, r10, 0x0, 0xffffffffffffffff, 0x0) 16:38:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/qat_adf_ctl\x00', 0x46, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x4102) r1 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000100)=""/148) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r6, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r8, 0x0) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r9, 0x6, 0x1, 0x0, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r11, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) r13 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0x0, r14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0x0, r15) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="020061a4", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000000", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="02000400", @ANYRES32=r10, @ANYBLOB="02000000", @ANYRES32=r11, @ANYBLOB="02000400", @ANYRES32=r12, @ANYBLOB="040001000000000008000200", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0xee00, @ANYBLOB="10000100000000002000040000000000"], 0x8c, 0x4) r16 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r17, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) keyctl$chown(0x4, 0x0, 0x0, r19) setxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_access\x00', &(0x7f0000000640)={{}, {0x1, 0x6}, [{0x2, 0x2, r16}, {0x2, 0x0, r5}, {0x2, 0x3}, {0x2, 0x4, r17}, {0x2, 0xa, r18}], {}, [{0x8, 0x0, r19}], {0x10, 0x4}}, 0x54, 0x3) 16:38:25 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000)=0xb5e, 0x6a3) listen(r0, 0x100000001) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xff, 0x1, 0x0, 0x8, 0x0, 0x3f, 0xef}, 0xb) socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r1, &(0x7f0000004300), 0x3a4, 0x0, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040)={{0x1f, 0xffffffff}, 0x20}, 0x10) 16:38:25 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x200, &(0x7f00000000c0)="1444fb592c51030a1344e9b05a81b879173a69c3049d935296410b6203fd1692613f81d35930e64d012a3920070656c58cd01b0be19df2d37816e81ba7716b7a21aad0e48f421d23ab39d5af90fe2d7decae4952e41d22a7bba618d98c3fe067a4c4bff18dc9", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="2a7b88c61b5fb97263b427d85eaed8f6f3b17b5f505c1a427db035a3c50069e9ee4188aa39e4505f8c03f65e4bd7b1c8e40db3e307997b0035bd7ae7ea") preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/25, 0x20000019}], 0x1, 0x0) syz_open_dev$usbfs(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x393, 0x0) 16:38:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="77f244aac029e2444c76d6"], 0xb) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000000)={0x5000, 0x114000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:38:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xce, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x8) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = shmget(0x3, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000000)=""/74) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) r4 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f0000000100)=""/148) ioctl$PIO_FONTX(r4, 0x4b6c, &(0x7f0000000240)="a2a4a9b7635b2fc417e3ea153b1901b0ec8c4398e2ba95a819c7580bd890c3b7a336a03409cce9916968d76d0aa42a73978b17bb619039db63f421c09be0e14fab87a490314316a2599a58bf74fa5bbcf5003afae1") ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) [ 226.350008] [ 226.351677] ====================================================== [ 226.357988] WARNING: possible circular locking dependency detected [ 226.364477] 4.14.149 #0 Not tainted [ 226.368097] ------------------------------------------------------ [ 226.374407] syz-executor.0/9920 is trying to acquire lock: [ 226.380025] (&mm->mmap_sem){++++}, at: [] __might_fault+0xe0/0x1d0 [ 226.388011] [ 226.388011] but task is already holding lock: [ 226.393973] (&rp->fetch_lock){+.+.}, at: [] mon_bin_read+0x5d/0x5e0 [ 226.402041] [ 226.402041] which lock already depends on the new lock. [ 226.402041] [ 226.410349] [ 226.410349] the existing dependency chain (in reverse order) is: [ 226.417967] [ 226.417967] -> #1 (&rp->fetch_lock){+.+.}: [ 226.423700] lock_acquire+0x16f/0x430 [ 226.428018] __mutex_lock+0xe8/0x1470 [ 226.432335] mutex_lock_nested+0x16/0x20 [ 226.436910] mon_bin_vma_fault+0x6f/0x280 [ 226.441572] __do_fault+0x104/0x390 [ 226.445705] __handle_mm_fault+0xde1/0x3470 [ 226.450533] handle_mm_fault+0x293/0x7c0 [ 226.455128] __get_user_pages+0x465/0x1220 [ 226.459871] populate_vma_page_range+0x18e/0x230 [ 226.465136] __mm_populate+0x198/0x2c0 [ 226.469534] vm_mmap_pgoff+0x1be/0x1d0 [ 226.473930] SyS_mmap_pgoff+0x3ca/0x520 [ 226.478412] SyS_mmap+0x16/0x20 [ 226.482203] do_syscall_64+0x1e8/0x640 [ 226.486599] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.493248] [ 226.493248] -> #0 (&mm->mmap_sem){++++}: [ 226.498806] __lock_acquire+0x2cb3/0x4620 [ 226.503470] lock_acquire+0x16f/0x430 [ 226.507795] __might_fault+0x143/0x1d0 [ 226.512198] _copy_to_user+0x2c/0xd0 [ 226.516438] mon_bin_read+0x2fb/0x5e0 [ 226.520756] do_iter_read+0x3e2/0x5b0 [ 226.525075] vfs_readv+0xd3/0x130 [ 226.529042] do_preadv+0x15d/0x200 [ 226.531021] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 226.533096] SyS_preadv+0x31/0x40 [ 226.533105] do_syscall_64+0x1e8/0x640 [ 226.533117] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.539572] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.543457] [ 226.543457] other info that might help us debug this: [ 226.543457] [ 226.543460] Possible unsafe locking scenario: [ 226.543460] [ 226.543461] CPU0 CPU1 [ 226.543463] ---- ---- [ 226.543464] lock(&rp->fetch_lock); [ 226.543469] lock(&mm->mmap_sem); [ 226.543475] lock(&rp->fetch_lock); [ 226.543479] lock(&mm->mmap_sem); [ 226.543483] [ 226.543483] *** DEADLOCK *** [ 226.543483] [ 226.543489] 1 lock held by syz-executor.0/9920: [ 226.543491] #0: (&rp->fetch_lock){+.+.}, at: [] mon_bin_read+0x5d/0x5e0 [ 226.543509] [ 226.543509] stack backtrace: [ 226.543516] CPU: 1 PID: 9920 Comm: syz-executor.0 Not tainted 4.14.149 #0 [ 226.543522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.603346] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 226.606012] Call Trace: [ 226.612279] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 226.616709] dump_stack+0x138/0x197 [ 226.616721] ? vprintk_func+0x65/0x159 [ 226.671765] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 226.677113] __lock_acquire+0x2cb3/0x4620 [ 226.681241] ? remove_wait_queue+0x10f/0x190 [ 226.685638] ? trace_hardirqs_on+0x10/0x10 [ 226.689862] lock_acquire+0x16f/0x430 [ 226.693641] ? __might_fault+0xe0/0x1d0 [ 226.697601] __might_fault+0x143/0x1d0 [ 226.701476] ? __might_fault+0xe0/0x1d0 [ 226.705490] _copy_to_user+0x2c/0xd0 [ 226.709195] mon_bin_read+0x2fb/0x5e0 [ 226.712983] do_iter_read+0x3e2/0x5b0 [ 226.716767] vfs_readv+0xd3/0x130 [ 226.720200] ? compat_rw_copy_check_uvector+0x310/0x310 [ 226.725570] ? __fget+0x237/0x370 [ 226.729009] ? __fget_light+0x172/0x1f0 [ 226.732982] do_preadv+0x15d/0x200 [ 226.736506] ? do_readv+0x2d0/0x2d0 [ 226.740149] ? SyS_clock_gettime+0xf8/0x180 [ 226.744462] ? SyS_writev+0x30/0x30 [ 226.748074] SyS_preadv+0x31/0x40 [ 226.751522] do_syscall_64+0x1e8/0x640 [ 226.755388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.760224] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.765395] RIP: 0033:0x459a59 [ 226.768576] RSP: 002b:00007fd35432cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 226.776704] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459a59 [ 226.783964] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 [ 226.791213] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 226.798477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd35432d6d4 [ 226.805742] R13: 00000000004c6fcb R14: 00000000004dc818 R15: 00000000ffffffff [ 226.870482] kobject: 'loop0' (ffff8880a802c9e0): kobject_uevent_env [ 226.876941] kobject: 'loop0' (ffff8880a802c9e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 226.931283] kobject: 'rx-0' (ffff888099e4d310): kobject_cleanup, parent ffff888092c3c148 [ 226.939827] kobject: 'rx-0' (ffff888099e4d310): auto cleanup 'remove' event [ 226.946999] kobject: 'rx-0' (ffff888099e4d310): kobject_uevent_env [ 226.953590] kobject: 'rx-0' (ffff888099e4d310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 226.963729] kobject: 'rx-0' (ffff888099e4d310): auto cleanup kobject_del [ 226.970615] kobject: 'rx-0' (ffff888099e4d310): calling ktype release [ 226.977176] kobject: 'rx-0': free name [ 226.981261] kobject: 'tx-0' (ffff8880a6260298): kobject_cleanup, parent ffff888092c3c148 [ 226.989485] kobject: 'tx-0' (ffff8880a6260298): auto cleanup 'remove' event [ 226.996614] kobject: 'tx-0' (ffff8880a6260298): kobject_uevent_env [ 227.003037] kobject: 'tx-0' (ffff8880a6260298): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.013124] kobject: 'tx-0' (ffff8880a6260298): auto cleanup kobject_del [ 227.020106] kobject: 'tx-0' (ffff8880a6260298): calling ktype release [ 227.026674] kobject: 'tx-0': free name [ 227.030962] kobject: 'queues' (ffff888092c3c148): kobject_cleanup, parent (null) [ 227.039367] kobject: 'queues' (ffff888092c3c148): calling ktype release [ 227.046143] kobject: 'queues' (ffff888092c3c148): kset_release [ 227.052138] kobject: 'queues': free name [ 227.056331] kobject: 'ip6gre0' (ffff8880446106f0): kobject_uevent_env [ 227.063060] kobject: 'ip6gre0' (ffff8880446106f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.100279] kobject: 'ip6gre0' (ffff8880446106f0): kobject_cleanup, parent (null) [ 227.108829] kobject: 'ip6gre0' (ffff8880446106f0): calling ktype release [ 227.115724] kobject: 'ip6gre0': free name [ 227.120559] kobject: 'rx-0' (ffff888099e4d490): kobject_cleanup, parent ffff888092c3c448 [ 227.128872] kobject: 'rx-0' (ffff888099e4d490): auto cleanup 'remove' event [ 227.136026] kobject: 'rx-0' (ffff888099e4d490): kobject_uevent_env [ 227.142367] kobject: 'rx-0' (ffff888099e4d490): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.152449] kobject: 'rx-0' (ffff888099e4d490): auto cleanup kobject_del [ 227.159292] kobject: 'rx-0' (ffff888099e4d490): calling ktype release [ 227.165892] kobject: 'rx-0': free name [ 227.169789] kobject: 'tx-0' (ffff888096f91c98): kobject_cleanup, parent ffff888092c3c448 [ 227.178179] kobject: 'tx-0' (ffff888096f91c98): auto cleanup 'remove' event [ 227.185352] kobject: 'tx-0' (ffff888096f91c98): kobject_uevent_env [ 227.191682] kobject: 'tx-0' (ffff888096f91c98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.201739] kobject: 'tx-0' (ffff888096f91c98): auto cleanup kobject_del [ 227.208580] kobject: 'tx-0' (ffff888096f91c98): calling ktype release [ 227.215252] kobject: 'tx-0': free name [ 227.219157] kobject: 'queues' (ffff888092c3c448): kobject_cleanup, parent (null) [ 227.227568] kobject: 'queues' (ffff888092c3c448): calling ktype release [ 227.234358] kobject: 'queues' (ffff888092c3c448): kset_release [ 227.240335] kobject: 'queues': free name [ 227.244528] kobject: 'ip6tnl0' (ffff888097e2d430): kobject_uevent_env [ 227.251131] kobject: 'ip6tnl0' (ffff888097e2d430): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.280175] kobject: 'ip6tnl0' (ffff888097e2d430): kobject_cleanup, parent (null) [ 227.288703] kobject: 'ip6tnl0' (ffff888097e2d430): calling ktype release [ 227.295594] kobject: 'ip6tnl0': free name [ 227.301196] kobject: 'rx-0' (ffff888092b0b250): kobject_cleanup, parent ffff888092c3c748 [ 227.309549] kobject: 'rx-0' (ffff888092b0b250): auto cleanup 'remove' event [ 227.316707] kobject: 'rx-0' (ffff888092b0b250): kobject_uevent_env [ 227.323089] kobject: 'rx-0' (ffff888092b0b250): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.333783] kobject: 'rx-0' (ffff888092b0b250): auto cleanup kobject_del [ 227.340760] kobject: 'rx-0' (ffff888092b0b250): calling ktype release [ 227.347328] kobject: 'rx-0': free name [ 227.351267] kobject: 'tx-0' (ffff8880a0357818): kobject_cleanup, parent ffff888092c3c748 [ 227.359482] kobject: 'tx-0' (ffff8880a0357818): auto cleanup 'remove' event [ 227.366608] kobject: 'tx-0' (ffff8880a0357818): kobject_uevent_env [ 227.372938] kobject: 'tx-0' (ffff8880a0357818): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.383038] kobject: 'tx-0' (ffff8880a0357818): auto cleanup kobject_del [ 227.389918] kobject: 'tx-0' (ffff8880a0357818): calling ktype release [ 227.396521] kobject: 'tx-0': free name [ 227.400452] kobject: 'queues' (ffff888092c3c748): kobject_cleanup, parent (null) [ 227.408853] kobject: 'queues' (ffff888092c3c748): calling ktype release [ 227.415625] kobject: 'queues' (ffff888092c3c748): kset_release [ 227.421612] kobject: 'queues': free name [ 227.425818] kobject: 'sit0' (ffff88809ff1d2f0): kobject_uevent_env [ 227.432164] kobject: 'sit0' (ffff88809ff1d2f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.460168] kobject: 'sit0' (ffff88809ff1d2f0): kobject_cleanup, parent (null) [ 227.468452] kobject: 'sit0' (ffff88809ff1d2f0): calling ktype release [ 227.475227] kobject: 'sit0': free name [ 227.479593] kobject: 'rx-0' (ffff8880a92df550): kobject_cleanup, parent ffff888092c3ca48 [ 227.487876] kobject: 'rx-0' (ffff8880a92df550): auto cleanup 'remove' event [ 227.494988] kobject: 'rx-0' (ffff8880a92df550): kobject_uevent_env [ 227.501316] kobject: 'rx-0' (ffff8880a92df550): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.511576] kobject: 'rx-0' (ffff8880a92df550): auto cleanup kobject_del [ 227.518410] kobject: 'rx-0' (ffff8880a92df550): calling ktype release [ 227.525017] kobject: 'rx-0': free name [ 227.528933] kobject: 'tx-0' (ffff888096db90d8): kobject_cleanup, parent ffff888092c3ca48 [ 227.538115] kobject: 'tx-0' (ffff888096db90d8): auto cleanup 'remove' event [ 227.545332] kobject: 'tx-0' (ffff888096db90d8): kobject_uevent_env [ 227.551693] kobject: 'tx-0' (ffff888096db90d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.561765] kobject: 'tx-0' (ffff888096db90d8): auto cleanup kobject_del [ 227.568608] kobject: 'tx-0' (ffff888096db90d8): calling ktype release [ 227.575195] kobject: 'tx-0': free name [ 227.579080] kobject: 'queues' (ffff888092c3ca48): kobject_cleanup, parent (null) [ 227.587560] kobject: 'queues' (ffff888092c3ca48): calling ktype release [ 227.594347] kobject: 'queues' (ffff888092c3ca48): kset_release [ 227.600331] kobject: 'queues': free name [ 227.604530] kobject: 'ip6_vti0' (ffff8880a602ef30): kobject_uevent_env [ 227.611212] kobject: 'ip6_vti0' (ffff8880a602ef30): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.640203] kobject: 'ip6_vti0' (ffff8880a602ef30): kobject_cleanup, parent (null) [ 227.648789] kobject: 'ip6_vti0' (ffff8880a602ef30): calling ktype release [ 227.656725] kobject: 'ip6_vti0': free name [ 227.661607] kobject: 'rx-0' (ffff8880930c5310): kobject_cleanup, parent ffff888092c3cd48 [ 227.669823] kobject: 'rx-0' (ffff8880930c5310): auto cleanup 'remove' event [ 227.677334] kobject: 'rx-0' (ffff8880930c5310): kobject_uevent_env [ 227.683690] kobject: 'rx-0' (ffff8880930c5310): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.693761] kobject: 'rx-0' (ffff8880930c5310): auto cleanup kobject_del [ 227.700783] kobject: 'rx-0' (ffff8880930c5310): calling ktype release [ 227.707384] kobject: 'rx-0': free name [ 227.711324] kobject: 'tx-0' (ffff8880887562d8): kobject_cleanup, parent ffff888092c3cd48 [ 227.719543] kobject: 'tx-0' (ffff8880887562d8): auto cleanup 'remove' event [ 227.726660] kobject: 'tx-0' (ffff8880887562d8): kobject_uevent_env [ 227.733006] kobject: 'tx-0' (ffff8880887562d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.743108] kobject: 'tx-0' (ffff8880887562d8): auto cleanup kobject_del [ 227.749960] kobject: 'tx-0' (ffff8880887562d8): calling ktype release [ 227.756718] kobject: 'tx-0': free name [ 227.760681] kobject: 'queues' (ffff888092c3cd48): kobject_cleanup, parent (null) [ 227.769070] kobject: 'queues' (ffff888092c3cd48): calling ktype release [ 227.775862] kobject: 'queues' (ffff888092c3cd48): kset_release [ 227.781956] kobject: 'queues': free name [ 227.786161] kobject: 'ip_vti0' (ffff88804647c670): kobject_uevent_env [ 227.792786] kobject: 'ip_vti0' (ffff88804647c670): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.830385] kobject: 'ip_vti0' (ffff88804647c670): kobject_cleanup, parent (null) [ 227.838950] kobject: 'ip_vti0' (ffff88804647c670): calling ktype release [ 227.845827] kobject: 'ip_vti0': free name [ 227.851318] kobject: 'batman_adv' (ffff8880a88fcc80): kobject_uevent_env [ 227.858179] kobject: 'batman_adv' (ffff8880a88fcc80): kobject_uevent_env: filter function caused the event to drop! [ 227.869016] kobject: 'batman_adv' (ffff8880a88fcc80): kobject_cleanup, parent (null) [ 227.877788] kobject: 'batman_adv' (ffff8880a88fcc80): calling ktype release [ 227.884900] kobject: (ffff8880a88fcc80): dynamic_kobj_release [ 227.890977] kobject: 'batman_adv': free name [ 227.895476] kobject: 'rx-0' (ffff8880a92df610): kobject_cleanup, parent ffff8880565ee148 [ 227.903828] kobject: 'rx-0' (ffff8880a92df610): auto cleanup 'remove' event [ 227.911068] kobject: 'rx-0' (ffff8880a92df610): kobject_uevent_env [ 227.917370] kobject: 'rx-0' (ffff8880a92df610): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.927433] kobject: 'rx-0' (ffff8880a92df610): auto cleanup kobject_del [ 227.934319] kobject: 'rx-0' (ffff8880a92df610): calling ktype release [ 227.940985] kobject: 'rx-0': free name [ 227.944883] kobject: 'tx-0' (ffff8880992f2298): kobject_cleanup, parent ffff8880565ee148 [ 227.953133] kobject: 'tx-0' (ffff8880992f2298): auto cleanup 'remove' event [ 227.960259] kobject: 'tx-0' (ffff8880992f2298): kobject_uevent_env [ 227.967000] kobject: 'tx-0' (ffff8880992f2298): kobject_uevent_env: uevent_suppress caused the event to drop! [ 227.977064] kobject: 'tx-0' (ffff8880992f2298): auto cleanup kobject_del [ 227.984043] kobject: 'tx-0' (ffff8880992f2298): calling ktype release [ 227.991004] kobject: 'tx-0': free name [ 227.994967] kobject: 'queues' (ffff8880565ee148): kobject_cleanup, parent (null) [ 228.003397] kobject: 'queues' (ffff8880565ee148): calling ktype release [ 228.010173] kobject: 'queues' (ffff8880565ee148): kset_release [ 228.016135] kobject: 'queues': free name [ 228.020407] kobject: 'erspan0' (ffff888084056ef0): kobject_uevent_env [ 228.026988] kobject: 'erspan0' (ffff888084056ef0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.070271] kobject: 'erspan0' (ffff888084056ef0): kobject_cleanup, parent (null) [ 228.078812] kobject: 'erspan0' (ffff888084056ef0): calling ktype release [ 228.085688] kobject: 'erspan0': free name [ 228.090417] kobject: 'batman_adv' (ffff8880a5d92600): kobject_uevent_env [ 228.097267] kobject: 'batman_adv' (ffff8880a5d92600): kobject_uevent_env: filter function caused the event to drop! [ 228.107917] kobject: 'batman_adv' (ffff8880a5d92600): kobject_cleanup, parent (null) [ 228.119169] kobject: 'batman_adv' (ffff8880a5d92600): calling ktype release [ 228.126538] kobject: (ffff8880a5d92600): dynamic_kobj_release [ 228.132453] kobject: 'batman_adv': free name [ 228.136966] kobject: 'rx-0' (ffff888082e46850): kobject_cleanup, parent ffff8880565ee548 [ 228.145316] kobject: 'rx-0' (ffff888082e46850): auto cleanup 'remove' event [ 228.152456] kobject: 'rx-0' (ffff888082e46850): kobject_uevent_env [ 228.158758] kobject: 'rx-0' (ffff888082e46850): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.168818] kobject: 'rx-0' (ffff888082e46850): auto cleanup kobject_del [ 228.175713] kobject: 'rx-0' (ffff888082e46850): calling ktype release [ 228.182349] kobject: 'rx-0': free name [ 228.186277] kobject: 'tx-0' (ffff8880a8d34598): kobject_cleanup, parent ffff8880565ee548 [ 228.194559] kobject: 'tx-0' (ffff8880a8d34598): auto cleanup 'remove' event [ 228.201667] kobject: 'tx-0' (ffff8880a8d34598): kobject_uevent_env [ 228.210685] kobject: 'tx-0' (ffff8880a8d34598): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.220761] kobject: 'tx-0' (ffff8880a8d34598): auto cleanup kobject_del [ 228.227607] kobject: 'tx-0' (ffff8880a8d34598): calling ktype release [ 228.234299] kobject: 'tx-0': free name [ 228.238185] kobject: 'queues' (ffff8880565ee548): kobject_cleanup, parent (null) [ 228.246607] kobject: 'queues' (ffff8880565ee548): calling ktype release [ 228.253515] kobject: 'queues' (ffff8880565ee548): kset_release [ 228.259466] kobject: 'queues': free name [ 228.263733] kobject: 'gretap0' (ffff8880445c6cf0): kobject_uevent_env [ 228.270340] kobject: 'gretap0' (ffff8880445c6cf0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.300213] kobject: 'gretap0' (ffff8880445c6cf0): kobject_cleanup, parent (null) [ 228.308730] kobject: 'gretap0' (ffff8880445c6cf0): calling ktype release [ 228.315783] net_ratelimit: 21 callbacks suppressed [ 228.315787] protocol 88fb is buggy, dev hsr_slave_0 [ 228.315823] protocol 88fb is buggy, dev hsr_slave_1 [ 228.331370] kobject: 'gretap0': free name [ 228.335912] kobject: 'rx-0' (ffff888082e46d90): kobject_cleanup, parent ffff8880565ee748 [ 228.344170] kobject: 'rx-0' (ffff888082e46d90): auto cleanup 'remove' event [ 228.351289] kobject: 'rx-0' (ffff888082e46d90): kobject_uevent_env [ 228.357591] kobject: 'rx-0' (ffff888082e46d90): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.367666] kobject: 'rx-0' (ffff888082e46d90): auto cleanup kobject_del [ 228.374575] kobject: 'rx-0' (ffff888082e46d90): calling ktype release [ 228.381242] kobject: 'rx-0': free name [ 228.385145] kobject: 'tx-0' (ffff88809d16aa18): kobject_cleanup, parent ffff8880565ee748 [ 228.393396] kobject: 'tx-0' (ffff88809d16aa18): auto cleanup 'remove' event [ 228.400509] kobject: 'tx-0' (ffff88809d16aa18): kobject_uevent_env [ 228.406815] kobject: 'tx-0' (ffff88809d16aa18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.416884] kobject: 'tx-0' (ffff88809d16aa18): auto cleanup kobject_del [ 228.423760] kobject: 'tx-0' (ffff88809d16aa18): calling ktype release [ 228.430346] kobject: 'tx-0': free name [ 228.434235] kobject: 'queues' (ffff8880565ee748): kobject_cleanup, parent (null) [ 228.442651] kobject: 'queues' (ffff8880565ee748): calling ktype release [ 228.449390] kobject: 'queues' (ffff8880565ee748): kset_release [ 228.455370] kobject: 'queues': free name [ 228.459565] kobject: 'gre0' (ffff88808c378b70): kobject_uevent_env [ 228.465912] kobject: 'gre0' (ffff88808c378b70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.490192] kobject: 'gre0' (ffff88808c378b70): kobject_cleanup, parent (null) 16:38:27 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f00000000c0)=@in4={0x21, 0xffff, 0x2, 0x10, {0x2, 0x4e27, @remote}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0xffffffd6, &(0x7f0000000040)=[{0x18, 0x110, 0x1, "9f86c89d90dda0db0e68210008000000000000ec"}], 0x18}}], 0x1, 0x0) socket(0x19, 0x2, 0x7f) close(r0) 16:38:27 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000000)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000240)='`', 0x1, 0x1000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 16:38:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:27 executing program 2: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000140), 0x385) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000040)=0x2000008, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000140), 0x385) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0x2000008, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f000031e000), 0x1c) accept4$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0xff, 0x222b047eb0cdd9fd) prlimit64(0x0, 0xe, 0x0, 0x0) r1 = socket$inet(0x10, 0x400008000000002, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a60080000000000000001180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b0798910000000004000000000000", 0xac}], 0x1}, 0x0) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x4, &(0x7f00000001c0)=[{0x4, 0x9, 0x8, 0x8}, {0x3, 0x81, 0x9, 0x1}, {0x7dc, 0x5, 0x8, 0x2}, {0xed4, 0xff, 0x0, 0x4}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) getrlimit(0x2, &(0x7f00000003c0)) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffffffffff10, 0x2, 0x0, 0x0, 0x1, 0x0, 0x82, 0x4}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./bus\x00', 0x0, 0x8}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000340)={0xf80, 0x6}) shmat(0xffffffffffffffff, &(0x7f00001b6000/0x13000)=nil, 0x4000) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 16:38:27 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0xdbee2ba324f3035c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x0, 0x30}, 0xc) 16:38:27 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x200, &(0x7f00000000c0)="1444fb592c51030a1344e9b05a81b879173a69c3049d935296410b6203fd1692613f81d35930e64d012a3920070656c58cd01b0be19df2d37816e81ba7716b7a21aad0e48f421d23ab39d5af90fe2d7decae4952e41d22a7bba618d98c3fe067a4c4bff18dc9", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="2a7b88c61b5fb97263b427d85eaed8f6f3b17b5f505c1a427db035a3c50069e9ee4188aa39e4505f8c03f65e4bd7b1c8e40db3e307997b0035bd7ae7ea") preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/25, 0x20000019}], 0x1, 0x0) syz_open_dev$usbfs(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x393, 0x0) [ 228.498516] kobject: 'gre0' (ffff88808c378b70): calling ktype release [ 228.506039] kobject: 'gre0': free name [ 228.510776] kobject: 'rx-0' (ffff888082edc910): kobject_cleanup, parent ffff8880565eea48 [ 228.531014] kobject: 'rx-0' (ffff888082edc910): auto cleanup 'remove' event [ 228.540343] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 228.544633] kobject: 'rx-0' (ffff888082edc910): kobject_uevent_env [ 228.552486] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.563710] kobject: 'rx-0' (ffff888082edc910): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.568472] ubi0: attaching mtd0 [ 228.574849] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 228.585395] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 228.591652] kobject: 'rx-0' (ffff888082edc910): auto cleanup kobject_del 16:38:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x4, 0x0, 0x80000000000004, 0x4, 0x0}, 0x21) socket(0x10, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xc2bed75bd10b6b26, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000080)={0x3a, @multicast1, 0x4e21, 0x0, 'lc\x00', 0x20, 0x1000, 0x4}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaa0900000000000000ffff08004d0000310000000100b2790f7f2edba15403b7725ac5616058019078ac7014bbac141411030490780000020045000000000000000020d800ac14"], 0x0) [ 228.602423] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 228.622359] kobject: '(null)' (ffff888047d3dd78): kobject_cleanup, parent (null) [ 228.625764] kobject: 'rx-0' (ffff888082edc910): calling ktype release [ 228.650080] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 228.661956] kobject: '(null)' (ffff888047d3dd78): calling ktype release [ 228.663652] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.673443] ubi0: attaching mtd0 [ 228.678522] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 228.687539] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:27 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x44601, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b0000001557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca230f4c7226c1257dddfa27c0a8172dd27fd638bda5bc3bdc66d0724ea6594a4a6c551b1"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0xfd41, 0x0, 0x1, 0x0, 0x0, 0x4040100}, 0x0) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() [ 228.690265] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.699901] kobject: '(null)' (ffff8880a95a4fb8): kobject_cleanup, parent (null) [ 228.710487] kobject: 'rx-0': free name [ 228.742482] kobject: 'tx-0' (ffff88805b9ec058): kobject_cleanup, parent ffff8880565eea48 [ 228.743347] kobject: '(null)' (ffff8880a95a4fb8): calling ktype release [ 228.754986] kobject: 'loop0' (ffff8880a802c9e0): kobject_uevent_env [ 228.772319] ceph: device name is missing path (no : separator in /dev/loop4) [ 228.780490] kobject: 'tx-0' (ffff88805b9ec058): auto cleanup 'remove' event [ 228.788084] kobject: 'loop0' (ffff8880a802c9e0): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:38:28 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0xdbee2ba324f3035c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x0, 0x30}, 0xc) 16:38:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = syz_open_procfs(0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f0000000100)=""/148) ioctl$TIOCCBRK(r2, 0x5428) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x1000, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x0, 0x3}, 0xfffffffffffffea2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r5, 0x0) ioctl$BLKSECDISCARD(r3, 0x127d, &(0x7f0000000200)=0xff0000000) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x6, 0x0) syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="6f626a5f757365723d6a71666d743d76667358302c66736d616769633d3078303030303030303030303030306336302c736d61636b6673666c6f6f723d6a71666d743d762ecccbff03000065aa0c933b1623bb667376302c736d61636b66736861743d757365725f75736e616d653d2c666f776e65723d", @ANYBLOB="4bcb4213f89e6a5d7e1123129f1377123362f5a35bdf67958da687a59999fd49ccce01387a8076764d9bc5c1eb1c825a70f5a5914b5af2f03b3227b126c9f9c52a1b8e70ceffc6106aae4363389e24d18178972a3f4f2f95806b2fd66edc532a5fb519c764cdfc642738a4d0a9c86f73001c73ada265ba6a2c386fef866f4aa9854390781fa98e12d5d51d49d889be49f6305de99304b3b821b48f0adf36a032ada762", @ANYBLOB=',fowner<', @ANYRESHEX=r2, @ANYBLOB="2c7065726d69745f646972656374696f2c636f6e746578743d757365725f752c736d61636b66737472616e736d7574653d6c6f74727573746564245cd4707070306370757365742c00"]) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r6, 0x40186f40, 0x76002d) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r7, 0x40186f40, 0x76002d) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x3, 0x80, 0xec29, 0x6, 0x9}, &(0x7f0000000340)=0x14) getxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.redirect\x00', &(0x7f0000000440)=""/4096, 0x1000) setsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000380)=@assoc_value={r8, 0x8}, 0x8) [ 228.798684] kobject: 'tx-0' (ffff88805b9ec058): kobject_uevent_env [ 228.805843] kobject: 'tx-0' (ffff88805b9ec058): kobject_uevent_env: uevent_suppress caused the event to drop! [ 228.826275] kobject: 'tx-0' (ffff88805b9ec058): auto cleanup kobject_del [ 228.833378] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 228.835574] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 228.840109] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 228.856121] ubi0: attaching mtd0 [ 228.858821] kobject: 'tx-0' (ffff88805b9ec058): calling ktype release [ 228.865162] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.878331] kobject: 'tx-0': free name [ 228.881276] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 228.882375] protocol 88fb is buggy, dev hsr_slave_0 [ 228.896426] protocol 88fb is buggy, dev hsr_slave_1 [ 228.899086] kobject: '(null)' (ffff8880a95a0f78): kobject_cleanup, parent (null) [ 228.901545] protocol 88fb is buggy, dev hsr_slave_0 [ 228.912367] kobject: '(null)' (ffff8880a95a0f78): calling ktype release [ 228.914973] protocol 88fb is buggy, dev hsr_slave_1 [ 228.938432] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env 16:38:28 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0xdbee2ba324f3035c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x0, 0x30}, 0xc) [ 228.947466] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 228.954821] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 228.964429] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 228.971867] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 228.972963] kobject: 'queues' (ffff8880565eea48): kobject_cleanup, parent (null) [ 228.982722] ubi0: attaching mtd0 [ 228.989850] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 228.994945] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.006501] kobject: 'queues' (ffff8880565eea48): calling ktype release [ 229.012342] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "obj_user=jqfmt=vfsX0" [ 229.030872] kobject: '(null)' (ffff88808a8c4f38): kobject_cleanup, parent (null) [ 229.039626] kobject: '(null)' (ffff88808a8c4f38): calling ktype release [ 229.046938] ubi0: attaching mtd0 [ 229.050518] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.054399] kobject: 'queues' (ffff8880565eea48): kset_release [ 229.070572] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.080136] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.086856] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:38:28 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0xdbee2ba324f3035c) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x0, 0x30}, 0xc) [ 229.087902] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.097997] kobject: '(null)' (ffff88808a8c0ef8): kobject_cleanup, parent (null) [ 229.122091] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.132998] kobject: '(null)' (ffff88808a8c0ef8): calling ktype release [ 229.134092] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.143149] ubi0: attaching mtd0 [ 229.152005] kobject: 'queues': free name [ 229.154703] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.157016] kobject: 'tunl0' (ffff8880a8e4e930): kobject_uevent_env [ 229.172349] kobject: '(null)' (ffff88808ceb4eb8): kobject_cleanup, parent (null) [ 229.172356] kobject: '(null)' (ffff88808ceb4eb8): calling ktype release [ 229.187753] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 229.190093] protocol 88fb is buggy, dev hsr_slave_0 [ 229.197679] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.200156] protocol 88fb is buggy, dev hsr_slave_1 [ 229.206464] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.214970] ubi0: attaching mtd0 [ 229.220720] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.224418] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.233586] kobject: 'tunl0' (ffff8880a8e4e930): kobject_uevent_env: uevent_suppress caused the event to drop! 16:38:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 229.244390] kobject: '(null)' (ffff88808ceb0e78): kobject_cleanup, parent (null) [ 229.261766] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 229.264586] kobject: '(null)' (ffff88808ceb0e78): calling ktype release [ 229.275411] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.289203] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 229.304246] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.314108] kobject: 'tunl0' (ffff8880a8e4e930): kobject_cleanup, parent (null) [ 229.327378] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.328571] kobject: 'tunl0' (ffff8880a8e4e930): calling ktype release [ 229.344021] kobject: 'tunl0': free name [ 229.345166] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env 16:38:28 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000000)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000240)='`', 0x1, 0x1000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 16:38:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:28 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000000)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000240)='`', 0x1, 0x1000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 16:38:28 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0)=r2, 0xdbee2ba324f3035c) [ 229.356961] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.364296] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.397197] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 229.405715] kobject: 'rx-0' (ffff8880a941bcd0): kobject_cleanup, parent ffff88805f62d648 [ 229.413133] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 229.417925] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.425705] ubi0: attaching mtd0 [ 229.433247] protocol 88fb is buggy, dev hsr_slave_0 [ 229.433288] protocol 88fb is buggy, dev hsr_slave_1 [ 229.438019] kobject: 'rx-0' (ffff8880a941bcd0): auto cleanup 'remove' event [ 229.446188] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 229.458824] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.461446] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.472303] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.477533] kobject: 'rx-0' (ffff8880a941bcd0): kobject_uevent_env [ 229.504800] kobject: 'rx-0' (ffff8880a941bcd0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.513435] ceph: device name is missing path (no : separator in /dev/loop4) [ 229.522802] kobject: '(null)' (ffff88805ba64ff8): kobject_cleanup, parent (null) [ 229.531821] kobject: '(null)' (ffff88805ba64ff8): calling ktype release [ 229.532598] kobject: 'rx-0' (ffff8880a941bcd0): auto cleanup kobject_del [ 229.544048] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.547978] kobject: 'rx-0' (ffff8880a941bcd0): calling ktype release 16:38:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 229.558917] kobject: 'rx-0': free name [ 229.567683] kobject: 'tx-0' (ffff8880826e5a58): kobject_cleanup, parent ffff88805f62d648 [ 229.569327] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.592007] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 229.598472] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:38:28 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x4ee, 0x9189}, &(0x7f0000000040)=0x90) 16:38:28 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x44601, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b0000001557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca230f4c7226c1257dddfa27c0a8172dd27fd638bda5bc3bdc66d0724ea6594a4a6c551b1"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f747970e5766d6e65743174727573746564202f7b23406d64f3c5198e5d9e09d87f1bc5113573756d5e08643573756d20245b29266b657972696e67736563757269747976626f786e0274316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f590224dc15567f9bea72118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d2150fe6dc2d895ae40001bac683e39cc8b83f81d723027dffbb4793952725b2e695d194868d5ac6b7235f85639518b51f5d59dd0080023f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0ae0f37e8f6007749c3a3938eeea11cca554f6f2ce9735adda2be082f971fbea36754f8073bc5f1ce6bd63c34b08add7ee3a03105bc52175d412e3a30ea031190335fd7ba8ef"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0xfd41, 0x0, 0x1, 0x0, 0x0, 0x4040100}, 0x0) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() [ 229.615940] kobject: 'tx-0' (ffff8880826e5a58): auto cleanup 'remove' event [ 229.623890] kobject: 'tx-0' (ffff8880826e5a58): kobject_uevent_env [ 229.630856] kobject: 'tx-0' (ffff8880826e5a58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.644144] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 229.660471] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.670734] ubi0: attaching mtd0 [ 229.672506] kobject: 'tx-0' (ffff8880826e5a58): auto cleanup kobject_del [ 229.677384] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.687011] kobject: 'loop0' (ffff8880a802c9e0): kobject_uevent_env [ 229.689492] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.705128] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 229.713888] kobject: 'tx-0' (ffff8880826e5a58): calling ktype release [ 229.714458] kobject: '(null)' (ffff888047fc1eb8): kobject_cleanup, parent (null) [ 229.721237] kobject: 'loop0' (ffff8880a802c9e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 229.732233] kobject: '(null)' (ffff888047fc1eb8): calling ktype release [ 229.740086] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.753228] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:38:29 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76002d) [ 229.763382] kobject: 'tx-0': free name [ 229.767385] kobject: 'queues' (ffff88805f62d648): kobject_cleanup, parent (null) [ 229.777349] ceph: device name is missing path (no : separator in /dev/loop3) [ 229.788585] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 229.796397] kobject: 'queues' (ffff88805f62d648): calling ktype release [ 229.807039] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 229.817047] kobject: 'queues' (ffff88805f62d648): kset_release [ 229.823373] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.830219] kobject: 'queues': free name [ 229.834627] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.836118] ubi0: attaching mtd0 [ 229.852005] kobject: 'lo' (ffff888044590730): kobject_uevent_env [ 229.860646] kobject: 'lo' (ffff888044590730): kobject_uevent_env: uevent_suppress caused the event to drop! [ 229.887427] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 229.893131] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 229.901033] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' 16:38:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 229.903221] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 229.933646] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 229.938643] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 229.944541] kobject: '(null)' (ffff888046690138): kobject_cleanup, parent (null) [ 229.952119] kobject: 'lo' (ffff888044590730): kobject_cleanup, parent (null) 16:38:29 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76002d) [ 229.959396] ceph: device name is missing path (no : separator in /dev/loop4) [ 229.969890] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 229.973676] kobject: '(null)' (ffff888046690138): calling ktype release [ 229.990288] kobject: 'lo' (ffff888044590730): calling ktype release [ 230.002535] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env 16:38:29 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'tunl0\x00', {0x2, 0x4e22, @rand_addr=0x8}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000000)) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000240)='`', 0x1, 0x1000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 16:38:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:29 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76002d) [ 230.010922] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.030349] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 230.032451] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.036806] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.046925] kobject: 'lo': free name [ 230.073996] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.112747] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env 16:38:29 executing program 1: r0 = socket$inet(0x10, 0x801, 0x5) sendmsg(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdbc, &(0x7f0000000080)=[{&(0x7f0000000140)="240000001a0003041dfffd946f6105000a00000a1f000003006708000800030004000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40186f40, 0x76002d) [ 230.123162] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 230.129325] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.159947] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env 16:38:29 executing program 1: socket$inet(0x10, 0x801, 0x5) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 230.177841] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.177940] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.198377] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.201949] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.244480] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 230.253844] ubi0: attaching mtd0 [ 230.257315] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) 16:38:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000540)='net/fib_triestat\x00') write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x10}}, 0x14) socket$kcm(0x10, 0x0, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xa3, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000001300)={0x26, 'hash\x00', 0x0, 0x0, 'mcryptd(cmac-aes-ce)\x00'}, 0x58) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002d40)={0x0, 0x989680}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000240)="285ec08e", 0x4) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000200)=[0x0, 0x4], 0x2) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r3, 0x40186f40, 0x76002d) r4 = socket(0xa, 0x1, 0x0) close(r4) sendmmsg$inet_sctp(r4, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}], 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}, 0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000140)={r6, 0x8}, &(0x7f00000003c0)=0x8) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) io_setup(0x9, &(0x7f0000000380)=0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101202, 0x0) io_submit(r8, 0x1, &(0x7f0000000440)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r9, 0x0, 0x0, 0x8}]) setsockopt$inet_MCAST_JOIN_GROUP(r9, 0x0, 0x2a, &(0x7f00000002c0)={0x0, {{0x2, 0x4e21, @remote}}}, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x0) [ 230.287613] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.319430] kobject: '(null)' (ffff88805cce43b8): kobject_cleanup, parent (null) [ 230.321559] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.330328] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 230.339043] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 230.346957] ceph: device name is missing path (no : separator in /dev/loop2) [ 230.349300] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.374565] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.374593] kobject: '(null)' (ffff88805cce43b8): calling ktype release [ 230.402984] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.406712] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 230.423680] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env 16:38:29 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x44601, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b0000001557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca230f4c7226c1257dddfa27c0a8172dd27fd638bda5bc3bdc66d0724ea6594a4a6c551b1"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0xfd41, 0x0, 0x1, 0x0, 0x0, 0x4040100}, 0x0) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() 16:38:29 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 230.432751] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.456000] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 230.480917] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env 16:38:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 230.494955] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:38:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 16:38:29 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 230.558411] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.566057] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 230.576350] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.576431] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env 16:38:29 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 16:38:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 230.604823] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.618363] rdma_op ffff8880438cc398 conn xmit_rdma (null) [ 230.627526] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.648130] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env 16:38:29 executing program 1: socket$inet(0x10, 0x0, 0x5) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) [ 230.664197] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env [ 230.667225] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.673337] rdma_op ffff88805a2acc58 conn xmit_rdma (null) [ 230.686369] ceph: device name is missing path (no : separator in /dev/loop4) [ 230.688281] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:38:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 230.713055] kobject: 'loop0' (ffff8880a802c9e0): kobject_uevent_env [ 230.725906] ceph: device name is missing path (no : separator in /dev/loop2) [ 230.730282] kobject: 'loop0' (ffff8880a802c9e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 230.737986] rdma_op ffff888054c6dc58 conn xmit_rdma (null) [ 230.749647] ubi0: attaching mtd0 [ 230.750120] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 230.753549] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 230.759582] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 230.770671] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.779161] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env [ 230.792206] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 230.804359] kobject: '(null)' (ffff888058d05978): kobject_cleanup, parent (null) 16:38:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 230.813375] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 230.813453] kobject: '(null)' (ffff888058d05978): calling ktype release [ 230.831595] rdma_op ffff888054c7dc98 conn xmit_rdma (null) [ 230.836114] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.852239] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.880783] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 230.887547] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.903068] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.910714] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.913684] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 230.923343] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 230.935414] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.935818] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 230.947535] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 230.962877] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 230.973526] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 230.983305] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 230.993626] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 231.000532] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 231.010797] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 231.017301] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.027673] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 231.034643] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.044938] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 231.051486] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 231.067085] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 231.077792] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 231.171701] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 231.181940] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:38:30 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 231.225146] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 231.236336] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 231.270631] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 231.285289] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.298995] rdma_op ffff888058f8db58 conn xmit_rdma (null) 16:38:30 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x44601, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b0000001557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca230f4c7226c1257dddfa27c0a8172dd27fd638bda5bc3bdc66d0724ea6594a4a6c551b1"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0xfd41, 0x0, 0x1, 0x0, 0x0, 0x4040100}, 0x0) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) restart_syscall() 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 16:38:30 executing program 1: socket$inet(0x10, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 16:38:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="52f05e50c876836cf980c068095d7f81b8f9d43e4984a232d62d43a96b", 0x1d, 0x6}, {&(0x7f0000000300)="5d8218b3340c39509aae72428466f0ef956558904c0c6a9e3aa0c981f58fbf3297a046835c9cf2f3a620f1380bc40a76f543d5320d5dd4ae3c33d7f074c929a3e1c5e24b020c686e6f9b743ce674dd2ac4568d831e5b94f1499ec8fe50763fa1d1f0d904589c03d2c201e61c3f58ce9bc65f7ed97a565376a9ffd4abc69b57f39ee0291e8b28b459f1ad52a62c2ffa2dec0ba1a68fe5cf3ada9a00da5f98232dbe7b1f10288cf94a147e661193a42f586960d628ca2283de6fd33be97aa4a77e6e", 0xc1, 0x29}, {&(0x7f0000000400)="d29ac5c79838b1fecb850f7c8ad77d30f137544e4ed1b856f857f5101be0f92445ed8edbf810b3020f331b242636cb4407df33169b82ca92e666ff77263e04d3d949f6eef46af69467e7589ea0ec7934200fc6ea1735a0f0b673e6cd42a0320e49a5876fe8b72263fe9e13c93d8ffb1f78c07e026650b11535e4613813e8b853ddd80e6ee99d382ec03619c2e3e865de79e66cdd2717d8c7daf62e8f5ef09799b27b9a4e1631891840bd50ca7ae2b6e4fd5b774ada494646b23a7de893b46e5ba7a869ab34913fa4d419e1d1083321abba76fda352d65e7ef35837b9f4374b673fd3f44da89164cf5de5", 0xea, 0x1}], 0x2000040, &(0x7f0000000580)='/dev/kvm\x00') fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:30 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 231.329565] kobject: 'loop0' (ffff8880a802c9e0): kobject_uevent_env [ 231.344320] kobject: 'loop0' (ffff8880a802c9e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 231.365066] ubi0: attaching mtd0 [ 231.370187] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env 16:38:30 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 231.382419] ubi0 error: ubi_attach_mtd_dev: bad VID header (134217728) or data offsets (134217792) [ 231.394465] rdma_op ffff88805af99218 conn xmit_rdma (null) [ 231.403378] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 231.407753] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) [ 231.434244] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env [ 231.441385] kobject: '(null)' (ffff88805a2b8b38): kobject_cleanup, parent (null) [ 231.463317] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.473503] rdma_op ffff8880446f03d8 conn xmit_rdma (null) 16:38:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000100"/24, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/156], @ANYBLOB="0503080000000000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/44], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/67], @ANYBLOB='C\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/198], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/15], @ANYBLOB='/\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000fc0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa0000"], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00'/42], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/77], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/244], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="db00000000000000"], @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 16:38:30 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) [ 231.478970] kobject: 'kvm' (ffff888219f96dd0): kobject_uevent_env [ 231.480755] kobject: '(null)' (ffff88805a2b8b38): calling ktype release [ 231.486412] kobject: 'kvm' (ffff888219f96dd0): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 231.505840] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 231.508350] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 231.523471] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.542700] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 231.547754] ceph: device name is missing path (no : separator in /dev/loop2) [ 231.553066] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.574636] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 231.581218] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.592275] kobject: 'loop3' (ffff8880a4a24120): kobject_uevent_env [ 231.598710] kobject: 'loop3' (ffff8880a4a24120): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 231.603345] kobject: 'loop2' (ffff8880a49e20a0): kobject_uevent_env [ 231.608653] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 231.615554] kobject: 'loop2' (ffff8880a49e20a0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 231.621067] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.621512] kobject: 'loop1' (ffff8880a49b46a0): kobject_uevent_env [ 231.646588] kobject: 'loop1' (ffff8880a49b46a0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 231.656533] kobject: 'loop5' (ffff8880a4af5320): kobject_uevent_env [ 231.663017] kobject: 'loop5' (ffff8880a4af5320): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 231.672938] kobject: 'loop4' (ffff8880a4a72a20): kobject_uevent_env [ 231.679372] kobject: 'loop4' (ffff8880a4a72a20): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:38:31 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x44601, 0x0) r1 = accept4$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0x1c, 0x81000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = accept(r2, &(0x7f00000003c0)=@can, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000740)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000002b0000001557671be6624a3d3c6701e0c3b08159012bf46f4241a8e2ce24dc3260448adbb67f69c7fdc73f3a9cbca230f4c7226c1257dddfa27c0a8172dd27fd638bda5bc3bdc66d0724ea6594a4a6c551b1"], &(0x7f0000000100)=0x4f) write$binfmt_script(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x16c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x41, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r6, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) r7 = syz_open_dev$midi(0x0, 0x9e7a, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={0x0, 0xfd41, 0x0, 0x1, 0x0, 0x0, 0x4040100}, 0x0) write$P9_RLOPEN(r5, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r6, 0x200000000002) r8 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) r9 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r10 = syz_open_dev$dri(0x0, 0x0, 0x0) r11 = dup3(r10, r9, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r11, 0x641e) ioctl$TIOCGPGRP(r11, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setsig(0x4203, r12, 0xe0, &(0x7f0000000500)={0x20}) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:38:31 executing program 1: socket$inet(0x10, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 16:38:31 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) 16:38:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='\xd6\xb0\xa8\xe7') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000005c0)=[0x1fc, 0x6ea]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:38:31 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x8}}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="48000000000000001