[ 51.843142][ T25] audit: type=1800 audit(1572964164.293:27): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 51.867585][ T25] audit: type=1800 audit(1572964164.293:28): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 52.833706][ T25] audit: type=1800 audit(1572964165.353:29): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 52.855334][ T25] audit: type=1800 audit(1572964165.353:30): pid=7918 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.19' (ECDSA) to the list of known hosts. 2019/11/05 14:29:34 fuzzer started 2019/11/05 14:29:36 dialing manager at 10.128.0.105:43787 2019/11/05 14:29:37 syscalls: 2553 2019/11/05 14:29:37 code coverage: enabled 2019/11/05 14:29:37 comparison tracing: enabled 2019/11/05 14:29:37 extra coverage: extra coverage is not supported by the kernel 2019/11/05 14:29:37 setuid sandbox: enabled 2019/11/05 14:29:37 namespace sandbox: enabled 2019/11/05 14:29:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 14:29:37 fault injection: enabled 2019/11/05 14:29:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 14:29:37 net packet injection: enabled 2019/11/05 14:29:37 net device setup: enabled 2019/11/05 14:29:37 concurrency sanitizer: enabled 2019/11/05 14:29:37 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/05 14:29:38 adding functions to KCSAN blacklist: 'generic_permission' 'blk_mq_sched_dispatch_requests' 'ep_poll' 'find_next_bit' '__hrtimer_run_queues' 'tomoyo_supervisor' 'pid_update_inode' 'osq_lock' 'tcp_add_backlog' 'tick_sched_do_timer' 'pipe_wait' 14:29:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) 14:29:41 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) syzkaller login: [ 69.342904][ T8090] IPVS: ftp: loaded support on port[0] = 21 [ 69.452063][ T8090] chnl_net:caif_netlink_parms(): no params data found [ 69.511855][ T8090] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.519396][ T8090] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.527451][ T8090] device bridge_slave_0 entered promiscuous mode [ 69.534962][ T8090] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.542797][ T8090] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.550694][ T8090] device bridge_slave_1 entered promiscuous mode [ 69.570956][ T8090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 69.574065][ T8093] IPVS: ftp: loaded support on port[0] = 21 [ 69.582244][ T8090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 69.610690][ T8090] team0: Port device team_slave_0 added [ 69.621510][ T8090] team0: Port device team_slave_1 added 14:29:42 executing program 2: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) [ 69.728366][ T8090] device hsr_slave_0 entered promiscuous mode [ 69.806389][ T8090] device hsr_slave_1 entered promiscuous mode [ 69.884843][ T8095] IPVS: ftp: loaded support on port[0] = 21 [ 70.001096][ T8090] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.008250][ T8090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.015589][ T8090] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.022784][ T8090] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.067253][ T8093] chnl_net:caif_netlink_parms(): no params data found 14:29:42 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 70.197620][ T8093] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.215210][ T8093] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.269846][ T8093] device bridge_slave_0 entered promiscuous mode [ 70.295771][ T8090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.323820][ T8093] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.336163][ T8093] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.344150][ T8093] device bridge_slave_1 entered promiscuous mode [ 70.402352][ T8090] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.419422][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.447947][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.497707][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.527993][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 70.622122][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.631163][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.656644][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.663711][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.696636][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.705691][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.756890][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.763982][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.796806][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.805949][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.857465][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.886746][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.895787][ T8095] chnl_net:caif_netlink_parms(): no params data found [ 70.922142][ T8090] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 70.946652][ T8124] IPVS: ftp: loaded support on port[0] = 21 [ 70.977199][ T8090] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.019058][ T8093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.034646][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.058774][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:29:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0x10) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000001c0)) [ 71.098929][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.117154][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.129585][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.162576][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.207066][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.250757][ T8093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.280834][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.299124][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.338396][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.411894][ T8090] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.427236][ T8093] team0: Port device team_slave_0 added [ 71.446982][ T8095] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.454088][ T8095] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.484379][ T8095] device bridge_slave_0 entered promiscuous mode [ 71.503530][ T8093] team0: Port device team_slave_1 added [ 71.523327][ T8095] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.566161][ T8095] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.574004][ T8095] device bridge_slave_1 entered promiscuous mode [ 71.628379][ T8130] IPVS: ftp: loaded support on port[0] = 21 [ 71.688708][ T8093] device hsr_slave_0 entered promiscuous mode 14:29:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 71.746423][ T8093] device hsr_slave_1 entered promiscuous mode [ 71.816187][ T8093] debugfs: Directory 'hsr0' with parent '/' already present! [ 71.846335][ T8095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.923449][ T8095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.078273][ T8124] chnl_net:caif_netlink_parms(): no params data found [ 72.107974][ T8095] team0: Port device team_slave_0 added [ 72.143466][ T8147] IPVS: ftp: loaded support on port[0] = 21 [ 72.147820][ T8095] team0: Port device team_slave_1 added 14:29:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 72.358930][ T8095] device hsr_slave_0 entered promiscuous mode [ 72.439606][ T8095] device hsr_slave_1 entered promiscuous mode [ 72.466105][ T8095] debugfs: Directory 'hsr0' with parent '/' already present! [ 72.495879][ T8093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.517492][ T8130] chnl_net:caif_netlink_parms(): no params data found [ 72.610845][ T8093] 8021q: adding VLAN 0 to HW filter on device team0 14:29:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 72.667420][ T8124] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.687179][ T8124] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.761864][ T8124] device bridge_slave_0 entered promiscuous mode [ 72.796132][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 72.803886][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 72.865024][ T8124] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.906248][ T8124] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.924232][ T8124] device bridge_slave_1 entered promiscuous mode [ 72.972946][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.036685][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.045059][ T2928] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.052187][ T2928] bridge0: port 1(bridge_slave_0) entered forwarding state 14:29:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 73.146681][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.155502][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.256557][ T2928] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.263644][ T2928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.405805][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 73.428004][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 73.477169][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 73.526582][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.535311][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.643742][ T8130] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.659254][ T8130] bridge0: port 1(bridge_slave_0) entered disabled state 14:29:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 73.707258][ T8130] device bridge_slave_0 entered promiscuous mode [ 73.800030][ T8130] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.849593][ T8130] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.910594][ T8130] device bridge_slave_1 entered promiscuous mode [ 73.950289][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.974186][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.019283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.076655][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.119718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.183897][ T8124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.211786][ T8093] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.249175][ T8093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.360946][ T8130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 14:29:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 74.405297][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.456902][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.507761][ T8124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.524670][ T8093] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 74.582727][ T8095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.624407][ T8130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.653830][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 74.663161][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 74.759073][ T8147] chnl_net:caif_netlink_parms(): no params data found 14:29:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r1, 0x6, 0xa, &(0x7f0000325f23)=""/221, &(0x7f0000000080)=0x1d55af2792096ba4) [ 74.837077][ T8095] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.845135][ T8124] team0: Port device team_slave_0 added [ 74.927200][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.936766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.967678][ T8130] team0: Port device team_slave_0 added [ 74.974219][ T8124] team0: Port device team_slave_1 added [ 74.997181][ T8130] team0: Port device team_slave_1 added [ 75.018384][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 75.055442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 75.088553][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.095755][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.149394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.178777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 75.205052][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.212151][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.290830][ T8147] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.316647][ T8147] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.324495][ T8147] device bridge_slave_0 entered promiscuous mode [ 75.368595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.380408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 75.407296][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 75.480972][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 75.503374][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 75.523299][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:29:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:29:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 75.547471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 75.612038][ T8245] FS-Cache: Duplicate cookie detected [ 75.616809][ T8124] device hsr_slave_0 entered promiscuous mode [ 75.617782][ T8245] FS-Cache: O-cookie c=000000007e72998f [p=000000000db3ae93 fl=222 nc=0 na=1] [ 75.632787][ T8245] FS-Cache: O-cookie d=0000000087875ce2 n=00000000405245d4 [ 75.640019][ T8245] FS-Cache: O-key=[10] '34323934393434383239' [ 75.646221][ T8245] FS-Cache: N-cookie c=00000000f82dc13b [p=000000000db3ae93 fl=2 nc=0 na=1] [ 75.655007][ T8245] FS-Cache: N-cookie d=0000000087875ce2 n=00000000db7249b2 [ 75.662317][ T8245] FS-Cache: N-key=[10] '34323934393434383239' [ 75.676461][ T8124] device hsr_slave_1 entered promiscuous mode [ 75.716376][ T8124] debugfs: Directory 'hsr0' with parent '/' already present! [ 75.729741][ T8147] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.737378][ T8147] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.745095][ T8147] device bridge_slave_1 entered promiscuous mode [ 75.766229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 75.828397][ T8130] device hsr_slave_0 entered promiscuous mode [ 75.884459][ T8130] device hsr_slave_1 entered promiscuous mode [ 75.936128][ T8130] debugfs: Directory 'hsr0' with parent '/' already present! [ 75.945950][ T8147] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.960222][ T8095] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 75.971490][ T8095] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 75.984488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 75.997229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 76.005779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 76.018549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 76.029632][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 76.063505][ T8147] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.123418][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 76.143716][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 76.198429][ T8095] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.296453][ T8147] team0: Port device team_slave_0 added [ 76.387766][ T8147] team0: Port device team_slave_1 added [ 76.473611][ T8124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.540404][ T8130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.606339][ T8124] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.625389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.647020][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.738873][ T8147] device hsr_slave_0 entered promiscuous mode [ 76.771363][ T8297] syz-executor.2 (8297): /proc/8296/oom_adj is deprecated, please use /proc/8296/oom_score_adj instead. [ 76.783737][ T8147] device hsr_slave_1 entered promiscuous mode [ 76.866369][ T8147] debugfs: Directory 'hsr0' with parent '/' already present! [ 76.877984][ T8130] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.887431][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.895355][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.930194][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.975670][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.019789][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.026941][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state 14:29:49 executing program 2: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) [ 77.187063][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.195223][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.266763][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.275130][ T8112] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.282221][ T8112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.456641][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.513582][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.567408][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.646245][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.676610][ T8112] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.683675][ T8112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.746817][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.755639][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.856592][ T8112] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.863692][ T8112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.950287][ T8112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.015182][ T8124] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 78.086094][ T8124] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 78.172316][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.181171][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.246844][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.255743][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.360545][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.427115][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.435547][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.530465][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.570396][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.626719][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.635801][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.740432][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.807231][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.815874][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.930154][ T8130] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 78.996234][ T8130] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.074832][ T8124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.156375][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.164570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.246705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.255107][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.326646][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.335256][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.434328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.501662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.546502][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.572622][ T8130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.665383][ T8147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.736571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.744359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.806353][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.821741][ T8147] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.926446][ T8123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.934300][ T8123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.046951][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 80.055929][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 80.121814][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.128990][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.196073][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 80.285309][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 80.325763][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.332950][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.369099][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 80.400070][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 80.438571][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 80.450152][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 80.492327][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 80.531636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 80.541158][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 80.555027][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 80.563841][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 80.577050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 80.585692][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 80.599751][ T8147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 80.613134][ T8123] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 80.652638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 80.663691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 80.684615][ T8147] 8021q: adding VLAN 0 to HW filter on device batadv0 14:29:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:29:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:29:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:29:56 executing program 2: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:29:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0x10) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000001c0)) 14:29:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:29:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0x10) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000001c0)) 14:29:56 executing program 2: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:29:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:29:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:29:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x100004}, 0x10) write(r0, &(0x7f0000000380)="240000001a00110214f9f407000904001100000000020000000200000800040003000000", 0x24) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000001c0)) 14:29:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:29:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:29:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:29:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:29:59 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:30:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="a4134950a9f973fac343581081b2a8421da1b8d8243c6ac10f6eab00416294d757e687e22055ccfb9828c467b9c91025a86772ff1d629af198b3d3a6d773dce9439df278be7f76150a9968beab9e62f8279bc5becb26e1b22afae1cc7958d29fdafd", 0x62}], 0x1}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:30:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:02 executing program 4: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:30:03 executing program 0: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:30:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) 14:30:03 executing program 4: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:30:05 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x3c000000) 14:30:05 executing program 0: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:30:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:05 executing program 4: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) 14:30:05 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:30:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:05 executing program 0: r0 = timerfd_create(0x0, 0x0) fstat(r0, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') writev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='15', 0x2}], 0x3e3) [ 93.431999][ C0] hrtimer: interrupt took 41170 ns 14:30:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:30:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x3c000000) 14:30:06 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r0, &(0x7f0000000140)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1a", 0x30) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000000040)=""/52, 0x20000074}], 0x1) 14:30:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff01800a0008003950323030302e4c191c238af768827b4e1ef54105ec5201460277da488b3066aba2159e794c0ed943b9b0d4908444de28fc48a0d91c39462472ab6ef299d5c87e1babdc6e2e200ddf1fdb65586481b23880b50000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0, 0x0, 0xfffffffffffffffe}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 14:30:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x3c000000) 14:30:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x3}, 0xd) 14:30:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0K\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX\xfc\xff\xff\xff\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9!\xc51\xd6\x8a\xebx\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8P\x1f\xe1)h\a\xe8Wn]\xe4Jd\x97YF\xc6\x88;\xc7\xee\xecy\xba\xb3\xfd\x1c?\xdc\x97V\xed\xf8;S$\xdf\xef3\xd4Z\x16\x94\xd9K!P\'\xa43$%n\x8bU*\x8f\xc5\xab\r1>\xfefE\xd5V5|s\xff\xdd{\xb1\x83\xc3\tj\xcd\r\xea\x1c\x86u\xe5Z\x92\xdc*\x06p\xa2i\xc6\x88\xfe1\xe4\xfen\x1a\xfb\xd8\xa9j~\xcf:?iq{\x9d\x82\xd6\x03\t\x8dO\xad\r\f\xcdB\xa5\xf8XU\xf7VW@d\xb8*\xb4\x1b[\xfb\xed\x0f\x85`\x1e1\x96\x9ao\xa6\xe3MT\xd9_\x01\xa4\xe5\x9b\xff\xcc\x83\xcdd\xd2\x11i\v\xe1\x17O\"\xdd \x06\x8a\xf1\xb4\xe7\xaa\x8c\xa8\f\x99K{\xf7\xf0\xa4\xbb\xcd\xc4\xe7\xd8$y\xf6\xdb\xfd0\xbf\xd6H6\x052\x94\xaaQ\x89<\xd4B`E\xc9u\x87B\xedl\x90%\xf4\x88\xa8\xd3\xd6\xf3*\xb5\xd2\xe0\xa3D@\xe0\x16\xe8S*\xe93\x9b1\xf9\x8dEibI=\"`\xd0\x12d\xf1F$\xf6y\xa2\xfd\"\x12u\x94i\x96\x8c\xe5\xb7\x9f[\x9c0\xbb\xf5\xa2\x96\x94\x83*\xfb%^') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) sendfile(r0, r0, 0x0, 0x6) 14:30:07 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) 14:30:07 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) 14:30:07 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:07 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) 14:30:07 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x3c000000) 14:30:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x3}, 0xd) 14:30:07 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) 14:30:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:07 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) 14:30:07 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x3}, 0xd) 14:30:07 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) 14:30:08 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz'}) 14:30:08 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeedcafe}}) 14:30:08 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd, 0x3}, 0xd) 14:30:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:08 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:09 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000004ff0)={0x3, &(0x7f0000002fe8)=[{0x15, 0x1401, 0x4000000000401}, {0x60}, {0x6}]}, 0x10) 14:30:09 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 5: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:09 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 97.883918][ T8704] ================================================================== [ 97.892093][ T8704] BUG: KCSAN: data-race in pipe_poll / pipe_write [ 97.898520][ T8704] [ 97.900875][ T8704] read to 0xffff8881031120f8 of 4 bytes by task 8707 on cpu 0: [ 97.908463][ T8704] pipe_poll+0x84/0x1d0 [ 97.912640][ T8704] do_select+0x7d0/0x1020 [ 97.916998][ T8704] core_sys_select+0x381/0x550 [ 97.921769][ T8704] do_pselect.constprop.0+0x11d/0x160 [ 97.927155][ T8704] __x64_sys_pselect6+0x12e/0x170 [ 97.932193][ T8704] do_syscall_64+0xcc/0x370 [ 97.936738][ T8704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 97.942625][ T8704] [ 97.944973][ T8704] write to 0xffff8881031120f8 of 4 bytes by task 8704 on cpu 1: [ 97.952640][ T8704] pipe_write+0x268/0x970 [ 97.956978][ T8704] new_sync_write+0x388/0x4a0 [ 97.961670][ T8704] __vfs_write+0xb1/0xc0 [ 97.965922][ T8704] vfs_write+0x18a/0x390 [ 97.970174][ T8704] ksys_write+0xd5/0x1b0 [ 97.974452][ T8704] __x64_sys_write+0x4c/0x60 [ 97.979063][ T8704] do_syscall_64+0xcc/0x370 [ 97.983582][ T8704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 97.989466][ T8704] [ 97.991797][ T8704] Reported by Kernel Concurrency Sanitizer on: [ 97.997967][ T8704] CPU: 1 PID: 8704 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 98.005791][ T8704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.015849][ T8704] ================================================================== [ 98.023924][ T8704] Kernel panic - not syncing: panic_on_warn set ... [ 98.030524][ T8704] CPU: 1 PID: 8704 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 98.038330][ T8704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.048389][ T8704] Call Trace: [ 98.051704][ T8704] dump_stack+0xf5/0x159 [ 98.055964][ T8704] panic+0x210/0x640 [ 98.059887][ T8704] ? vprintk_func+0x8d/0x140 [ 98.064492][ T8704] kcsan_report.cold+0xc/0xe [ 98.069102][ T8704] kcsan_setup_watchpoint+0x3fe/0x410 [ 98.074502][ T8704] __tsan_unaligned_write4+0x143/0x1f0 [ 98.079987][ T8704] pipe_write+0x268/0x970 14:30:10 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:10 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:30:10 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r0, 0x2) r1 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x20000, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 98.084351][ T8704] new_sync_write+0x388/0x4a0 [ 98.089053][ T8704] __vfs_write+0xb1/0xc0 [ 98.093391][ T8704] vfs_write+0x18a/0x390 [ 98.097666][ T8704] ksys_write+0xd5/0x1b0 [ 98.101927][ T8704] __x64_sys_write+0x4c/0x60 [ 98.106543][ T8704] do_syscall_64+0xcc/0x370 [ 98.111073][ T8704] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 98.116972][ T8704] RIP: 0033:0x45a219 [ 98.120915][ T8704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 98.140557][ T8704] RSP: 002b:00007f5a4235dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 98.148984][ T8704] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 98.156996][ T8704] RDX: 0000000041395527 RSI: 0000000020000340 RDI: 0000000000000008 [ 98.164983][ T8704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 98.172972][ T8704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a4235e6d4 [ 98.180959][ T8704] R13: 00000000004c6cf5 R14: 00000000004e2238 R15: 00000000ffffffff [ 98.190527][ T8704] Kernel Offset: disabled [ 98.194921][ T8704] Rebooting in 86400 seconds..