[ 40.508161][ T26] audit: type=1800 audit(1552921307.031:27): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 40.536968][ T26] audit: type=1800 audit(1552921307.111:28): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.292572][ T26] audit: type=1800 audit(1552921307.871:29): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 41.313379][ T26] audit: type=1800 audit(1552921307.871:30): pid=7591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.63' (ECDSA) to the list of known hosts. 2019/03/18 15:01:55 fuzzer started 2019/03/18 15:01:57 dialing manager at 10.128.0.26:44447 2019/03/18 15:01:58 syscalls: 1 2019/03/18 15:01:58 code coverage: enabled 2019/03/18 15:01:58 comparison tracing: enabled 2019/03/18 15:01:58 extra coverage: extra coverage is not supported by the kernel 2019/03/18 15:01:58 setuid sandbox: enabled 2019/03/18 15:01:58 namespace sandbox: enabled 2019/03/18 15:01:58 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/18 15:01:58 fault injection: enabled 2019/03/18 15:01:58 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/18 15:01:58 net packet injection: enabled 2019/03/18 15:01:58 net device setup: enabled 15:04:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x200800, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, 0x0, 0x4004) connect$inet6(r0, &(0x7f0000000080), 0x1c) pipe(&(0x7f0000000240)) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0xfd27) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) syzkaller login: [ 208.457520][ T7755] IPVS: ftp: loaded support on port[0] = 21 15:04:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7, 0xbd) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x22, 0x0) [ 208.568395][ T7755] chnl_net:caif_netlink_parms(): no params data found [ 208.645558][ T7755] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.671950][ T7755] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.680397][ T7755] device bridge_slave_0 entered promiscuous mode [ 208.697580][ T7755] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.705402][ T7755] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.714911][ T7755] device bridge_slave_1 entered promiscuous mode [ 208.729978][ T7758] IPVS: ftp: loaded support on port[0] = 21 15:04:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40100, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r2, 0x7002) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fsetxattr(r3, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) accept4$inet(r1, &(0x7f0000000440)={0x2, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x30, 0x0, 0x321, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x6, 0x4d13, 0x3}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x96d7cb770b6f6c56}, 0x814) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, 0x0) [ 208.760647][ T7755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 208.789015][ T7755] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 208.833806][ T7755] team0: Port device team_slave_0 added [ 208.863328][ T7755] team0: Port device team_slave_1 added 15:04:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x40045108, &(0x7f0000a07fff)) [ 208.963972][ T7755] device hsr_slave_0 entered promiscuous mode [ 209.001502][ T7755] device hsr_slave_1 entered promiscuous mode [ 209.078251][ T7755] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.085630][ T7755] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.093562][ T7755] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.100819][ T7755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.135446][ T7761] IPVS: ftp: loaded support on port[0] = 21 [ 209.173808][ T7758] chnl_net:caif_netlink_parms(): no params data found [ 209.230307][ T7755] 8021q: adding VLAN 0 to HW filter on device bond0 [ 209.247720][ T7764] IPVS: ftp: loaded support on port[0] = 21 15:04:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x1, 0x105080) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0x64763bc5, 0x1}) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000300)={0x0, 0x1ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, 0x0, &(0x7f0000000240)) poll(&(0x7f0000000000), 0x1, 0x0) r3 = memfd_create(&(0x7f00000000c0)='/dev/loop#\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r0, r1, 0x0, 0x102000002) [ 209.297181][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.322888][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.342075][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.362017][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 209.386503][ T7755] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.454471][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.467202][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.474378][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.482566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.492108][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.499285][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.516167][ T7758] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.524732][ T7758] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.533428][ T7758] device bridge_slave_0 entered promiscuous mode 15:04:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) open_by_handle_at(r1, &(0x7f0000000040)={0x8, 0x1}, 0x101000) [ 209.569171][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 209.574970][ T7768] IPVS: ftp: loaded support on port[0] = 21 [ 209.582732][ T7758] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.590180][ T7758] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.600010][ T7758] device bridge_slave_1 entered promiscuous mode [ 209.644443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.653016][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 209.662791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 209.700705][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 209.715089][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 209.731939][ T7755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 209.743783][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.776289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 209.784837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.797125][ T7758] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.809841][ T7758] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.820422][ T7761] chnl_net:caif_netlink_parms(): no params data found [ 209.879029][ T7758] team0: Port device team_slave_0 added [ 209.889227][ T7758] team0: Port device team_slave_1 added [ 209.890765][ T7771] IPVS: ftp: loaded support on port[0] = 21 [ 209.962729][ T7761] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.969914][ T7761] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.978643][ T7761] device bridge_slave_0 entered promiscuous mode [ 210.044787][ T7758] device hsr_slave_0 entered promiscuous mode [ 210.111464][ T7758] device hsr_slave_1 entered promiscuous mode [ 210.169405][ T7761] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.177954][ T7761] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.185887][ T7761] device bridge_slave_1 entered promiscuous mode [ 210.193852][ T7764] chnl_net:caif_netlink_parms(): no params data found [ 210.247066][ T7761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.257724][ T7761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.306133][ T7761] team0: Port device team_slave_0 added [ 210.334959][ T7755] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.354040][ T7761] team0: Port device team_slave_1 added [ 210.406511][ T7768] chnl_net:caif_netlink_parms(): no params data found [ 210.427913][ T7764] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.436702][ T7776] tls_set_device_offload_rx: netdev lo with no TLS offload [ 210.438841][ T7764] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.458744][ T7764] device bridge_slave_0 entered promiscuous mode [ 210.487422][ T7764] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.495452][ T7764] bridge0: port 2(bridge_slave_1) entered disabled state 15:04:37 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) socket$key(0xf, 0x3, 0x2) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'threaded\x00'}) [ 210.504541][ T7764] device bridge_slave_1 entered promiscuous mode [ 210.516465][ T7776] tls_set_device_offload_rx: netdev lo with no TLS offload [ 210.564310][ T7761] device hsr_slave_0 entered promiscuous mode [ 210.597098][ T7761] device hsr_slave_1 entered promiscuous mode [ 210.738944][ T7764] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.750786][ T7764] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:04:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000140)={'ip6gre0\x00', @ifru_map}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCX25SCALLUSERDATA(r1, 0x89e5, &(0x7f0000000200)={0x2e, "a2d698df81038266ed1747e8de48c6b898a9cb6f1224256392040b0a7bdbef94c9b82052527d37e06355424df6c487d6b3f5535f53058eba4ae63bb2a8bf5af08527412f977222de5fffbc4fc72f2eb3e34140fa89106b26114549dcfb2f2e0271e720c1a0f3351ba30ed5b529ae5da60da0cf9e6a14157e755726b436a12c5f"}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000100)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) [ 210.787982][ T7758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.875781][ T7768] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.883281][ T7768] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.890969][ T7768] device bridge_slave_0 entered promiscuous mode [ 210.899181][ T7768] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.908161][ T7768] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.916169][ T7768] device bridge_slave_1 entered promiscuous mode 15:04:37 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c2274d78003b0b18b4b4e362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476a0100b1fd"], @ANYRESDEC=r1]], 0x8}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(r2, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000340)={r3, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 210.948224][ T7764] team0: Port device team_slave_0 added [ 210.956174][ T7764] team0: Port device team_slave_1 added [ 210.982287][ T7771] chnl_net:caif_netlink_parms(): no params data found [ 211.036378][ T7758] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.053094][ T7761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.067708][ T7768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.084415][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.093339][ C0] hrtimer: interrupt took 28518 ns [ 211.097978][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.183886][ T7764] device hsr_slave_0 entered promiscuous mode [ 211.221787][ T7764] device hsr_slave_1 entered promiscuous mode [ 211.224987][ T7800] overlayfs: filesystem on './file0' not supported as upperdir 15:04:37 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c2274d78003b0b18b4b4e362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476a0100b1fd"], @ANYRESDEC=r1]], 0x8}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(r2, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000340)={r3, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 211.283663][ T7768] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.316221][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.351775][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.362137][ T7765] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.369299][ T7765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.378109][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.387200][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.396631][ T7765] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.403847][ T7765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.413395][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.461879][ T7768] team0: Port device team_slave_0 added [ 211.469084][ T7768] team0: Port device team_slave_1 added [ 211.486716][ T7761] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.498758][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.507741][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.516513][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.525323][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.550726][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.560262][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.575176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.583904][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.595824][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.603752][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.612558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.622877][ T7771] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.630063][ T7771] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.639183][ T7771] device bridge_slave_0 entered promiscuous mode [ 211.677151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.686192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.695651][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.702786][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.710721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.719998][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.728730][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.735873][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.749584][ T7758] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.764400][ T7758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:04:38 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c2274d78003b0b18b4b4e362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476a0100b1fd"], @ANYRESDEC=r1]], 0x8}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(r2, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000340)={r3, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 211.775141][ T7771] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.783233][ T7771] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.791556][ T7771] device bridge_slave_1 entered promiscuous mode [ 211.863872][ T7768] device hsr_slave_0 entered promiscuous mode [ 211.891719][ T7768] device hsr_slave_1 entered promiscuous mode [ 211.950929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.959225][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.974346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.995195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 15:04:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x000\xdf\xaa_(\x00\x00\x00\x00\x00\x00\x00\x00;\x00'}}) [ 212.029448][ T7771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.048808][ T7771] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.060036][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.070742][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.080233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.089052][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.115085][ T7758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.193449][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.213529][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.228915][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:04:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x000\xdf\xaa_(\x00\x00\x00\x00\x00\x00\x00\x00;\x00'}}) [ 212.259172][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.299748][ T7761] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 212.339342][ T7761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 212.348824][ T7771] team0: Port device team_slave_0 added [ 212.364122][ T7771] team0: Port device team_slave_1 added 15:04:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x000\xdf\xaa_(\x00\x00\x00\x00\x00\x00\x00\x00;\x00'}}) [ 212.392502][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.406628][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.505889][ T7771] device hsr_slave_0 entered promiscuous mode [ 212.561456][ T7771] device hsr_slave_1 entered promiscuous mode [ 212.635342][ T7761] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.649284][ T7768] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.669732][ T7764] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.706257][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.715282][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.730441][ T7764] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.752088][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.759882][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.783558][ T7768] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.819960][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.830081][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.844545][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.851680][ T7763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.863505][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.879934][ T7771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.894464][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 212.906701][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:04:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40100, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r2, 0x7002) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fsetxattr(r3, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) accept4$inet(r1, &(0x7f0000000440)={0x2, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x30, 0x0, 0x321, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x6, 0x4d13, 0x3}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x96d7cb770b6f6c56}, 0x814) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, 0x0) [ 212.917393][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.936452][ T7765] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.943608][ T7765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.954509][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.963402][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.972730][ T7765] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.979895][ T7765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.015664][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.026242][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.039203][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.051225][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.058294][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.073834][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.083003][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.093704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.102968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.115883][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.124567][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.133873][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.142433][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.150607][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.159389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.168072][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.176104][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.184870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.197683][ T7771] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.212497][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.220986][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.232577][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.241424][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.249698][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.258431][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.269993][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.277888][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.286224][ T7763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.296540][ T7768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.309124][ T7764] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.322454][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.338180][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.347064][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.355531][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.364180][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.372950][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.379999][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.387729][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.396925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.405362][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.412510][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.420329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.429462][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.460184][ T7764] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.468520][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.478412][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.487717][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.497077][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.515516][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.526380][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.535680][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.545257][ T7765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.560245][ T7771] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 213.572896][ T7771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.582200][ T7768] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.591203][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.599742][ T7780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.670485][ T7771] 8021q: adding VLAN 0 to HW filter on device batadv0 15:04:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x40045108, &(0x7f0000a07fff)) 15:04:40 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0x31, "91b4836052b4c13751f042d952a9a3f0d6ffb9bd94b3fd30102e625ba8fb7443e52cdea9078c88971f2510c4047a7a8b41"}, &(0x7f0000000280)=0x39) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001680)={0x0, 0x8}, &(0x7f00000016c0)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000001700)={0x0, 0xa4b1}, &(0x7f0000001740)=0x8) fcntl$setpipe(r0, 0x407, 0x7937e84b) r4 = accept4$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a00)=0x14, 0x80800) accept$packet(r4, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000001c80)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001780)={0x0, 0x7fffffff}, &(0x7f00000017c0)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000001940)=[{&(0x7f0000000080)=@in={0x2, 0x4e23, @rand_addr=0x6}, 0x10, &(0x7f0000000200)=[{&(0x7f00000000c0)="d06f2acf291fc1540ba614cd3ba2492764a83f406023a4044b880fd6904b6806c2688374c6691d7e213c1c7b840a86511a0bbf99754026cb3211910b89fe91e5204875ff5c65ef7a578e66e694e2c71633b7b6250d14776bce90b4e5a470293042eb8b2331d29be77ace0b84c95b316a43d76ee3d18d41512d6fd5", 0x7b}, {&(0x7f0000000140)="87722ea6738f3215a14d", 0xa}], 0x2, &(0x7f0000001b40)=ANY=[@ANYBLOB="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", @ANYRES32=r1], 0x38, 0x10}, {&(0x7f0000000300)=@in6={0xa, 0x4e21, 0x2, @remote, 0x9}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000340)="ab8867b720919f85b72a5b9934381ccd95c341aca8d60aa9bc8f8b4e0c1bd883e7cd755687497f0209d391f722b536569baa195332fbcd43c544060512f6550032eb235b41262a20d3b713717878af547684d2edb3d75cad218ed3543b5d706cfb98f35c99c8e0fa58741942d9d0dfab175f926fa5cce811799edbfc2d55adff2e46491bf41288685ff8af26755ffd6cfb70b75cd55875c34e62", 0x9a}, {&(0x7f0000000400)="2a5dc4fb7b34133e591495", 0xb}, {&(0x7f0000000480)="9d588a02347d54847e4c6a19ba4be646ea33b631d6e63a8ec55b6ca3b3a432f817b4468527496e2bc78af50d1de7b88cea5a149e0e51bbce336b541fd99efeab767e25cc13cba9a83f259f79c7d55c9324608425744b49a3a99c93ef5d40feeea78fd16423c45ae60ec5c0603ef0cb3fd90f8b5ed10337efa14e7a50bd3e1814e58c3c0e1eea64152a8e569ca43ee1cd7c8ed91ddabfc86aac59d3d99e616d6b911c63c6504268f588fe30bb38902d", 0xaf}, {&(0x7f0000000540)="4c57b7d9d5c74ebe22012bd7414f2860e2713da79de21ac04207215b7c191e8e62e0b63b63c898320d4f5dd8e3bb591e6a71298338cc9a35ffd121dea01e7a5886f109f6fa019c7c1ece7420b352cce79a904358de434b46f5103aa24cba1b6ce93ee7d8ed7eb4c037f53ceb1e812d6402c2b69f416bf90832db868431734945231b295253f5", 0x86}, {&(0x7f0000000600)="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", 0x1000}], 0x5, &(0x7f0000001e00)=ANY=[@ANYBLOB="3000000000000000840000000100000000800900010200000500000004000000ff0f0000faffffff00000000", @ANYRES32=r2, @ANYBLOB="18000000000000008400000007000000e00000020000000018000000000000008400000000000000070009000000080020000000000000008400000008000000fe8000000000000000000000000000aa18000000000000008400000006000000010000000000000030000000000000008400000001000000010002000c8200000300000007000000020000000300000007000000", @ANYRES32=r3, @ANYBLOB="3000000000000000840000008ace0001fcffffff000200006f004ae9330000bb000000281000000600d422f2", @ANYRES32=r5, @ANYBLOB="18005700000000008400000006000000ff7f0000000000001bd27e864d2e24acbf856d48caf30aa9745e88a5516401f32042336bc8f28592ce0dc5b4c2b836c60df20592c150e10ed54e17057fd56f2ab65f268092d78dbb5075b3c9743f39b141c6247e5ae7bae8100c79fc6ad63aa2d63a8c4cecf5810a3c95ae10dc1390c9d99adf7d276d0c2fa7ef7743e6508a303466d880e72b98e9ca275464acc1cea3fcdc2ac6cc06f5b7419ea2425681c9f857df136da602a4aa14d77a95d79bed0a3b2013f4c4e2e0419aff139c5effed421de259a7f4d4444a"], 0x110, 0x4008004}], 0x2, 0x1) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000180)=0xbf, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e1d, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0xfffffffffffffffd}, 0x1a8) r6 = dup3(r0, r0, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000019c0)={0xc, 0x1, 0x2fb, 0x9, 0x20, r6, 0x8}, 0x2c) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000001ac0)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000001cc0)={{0x7002, 0x100000, 0x9, 0x400, 0x0, 0x1ff, 0x9, 0x6, 0x8001, 0xede, 0x2, 0x5}, {0x1000, 0x100000, 0xf, 0xf8, 0x2, 0x9e8, 0x7f, 0x7, 0x9, 0x3f, 0x0, 0x8}, {0x1d001, 0xf000, 0xf, 0x800, 0xfff, 0x100000001, 0x0, 0x7, 0x6, 0x3ff, 0x1, 0x7fffffff}, {0x3001, 0x0, 0xf, 0x80000000, 0x7, 0x7, 0x1, 0x7fffffff, 0x400, 0x2, 0x5, 0xdadb}, {0x4000, 0x100000, 0xf, 0xe4f, 0x2, 0xa5, 0x0, 0x81, 0x8, 0x7, 0x1f, 0xef10}, {0x78ad64304ea893c1, 0x5000, 0x10, 0x8, 0x7, 0x4, 0x7, 0x1d, 0x20, 0x13aa48e9, 0x1, 0x3}, {0x2, 0x3004, 0x4, 0x80000000, 0x401, 0x400, 0x6, 0x7, 0x1, 0x8000, 0x7fff, 0x80000001}, {0x0, 0x0, 0x10, 0x12, 0x8, 0x7fffffff, 0xffffffffffffff7e, 0x4, 0x2, 0x8, 0x0, 0x2}, {0x6000, 0x10000}, {0xd000, 0x1000}, 0x0, 0x0, 0x2000, 0x0, 0xb, 0x8000, 0x100002, [0x3, 0x6, 0xdfec, 0x5]}) writev(r0, &(0x7f0000000440)=[{&(0x7f00000001c0)='R', 0x1}], 0x1) 15:04:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r1}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x000\xdf\xaa_(\x00\x00\x00\x00\x00\x00\x00\x00;\x00'}}) 15:04:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40100, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x401) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r2, 0x7002) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) fsetxattr(r3, 0x0, 0x0, 0x0, 0x2) r4 = openat$cgroup_subtree(r3, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x800000000002b, 'pids'}]}, 0x6) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x2d, 'pids'}]}, 0x6) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) accept4$inet(r1, &(0x7f0000000440)={0x2, 0x0, @remote}, &(0x7f0000000480)=0x10, 0x800) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x8) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x30, 0x0, 0x321, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x6, 0x4d13, 0x3}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x96d7cb770b6f6c56}, 0x814) ioctl$VIDIOC_SUBDEV_G_SELECTION(r3, 0xc040563d, 0x0) 15:04:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x40045108, &(0x7f0000a07fff)) 15:04:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) recvfrom(r0, &(0x7f0000000280)=""/205, 0xcd, 0x2001, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @rand_addr=0xfffffffeffffffff}, 0x2, 0x3, 0x1, 0x4}}, 0x80) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 15:04:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x1, 0x105080) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0x64763bc5, 0x1}) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000300)={0x0, 0x1ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, 0x0, &(0x7f0000000240)) poll(&(0x7f0000000000), 0x1, 0x0) r3 = memfd_create(&(0x7f00000000c0)='/dev/loop#\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r0, r1, 0x0, 0x102000002) [ 214.062707][ T7845] syz-executor.4 (7845) used greatest stack depth: 21832 bytes left 15:04:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x1, 0x105080) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0x64763bc5, 0x1}) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000300)={0x0, 0x1ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, 0x0, &(0x7f0000000240)) poll(&(0x7f0000000000), 0x1, 0x0) r3 = memfd_create(&(0x7f00000000c0)='/dev/loop#\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r0, r1, 0x0, 0x102000002) 15:04:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x40045108, &(0x7f0000a07fff)) [ 214.251367][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 214.257330][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 214.341820][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 214.348288][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:04:41 executing program 3: syz_open_dev$binder(&(0x7f0000232ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = memfd_create(&(0x7f0000002580)=']u]selinu^\xdbppp1\x1b\x1f\x1bF1$K\b\x06\xca\xf8\xa7\xb8\x1e\xa3P\xdb\xa0-\x95\xb4\xf1\xdb;\x88\xc9\x88\x15\xbd\x80Q]gA\x96\x05\x00\x00\x00\x00\x00\x00\x00\xe4\x12\x00s\x88\xc3iL\x94Z\x97\x8e\xaf\x9c\x01\x16\xdbb\x95\xfb\\9\x8b\xa0\xe6f\xbe\xa1\x945\xa9U}\x9c\x8b5\x14\xc62\xf8\xfa\'_{\xb9\x88[\xb7?-\xbf\xfd\xac\xaa\xc9\x81\xd4\xd0\xdd+\x0f\xbc\xdb\x152\xd245\x1b\xdeDa\x04K\x80\xcb\x14\x840x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x81, 0x2, [0x7fffffff, 0x5]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r3, 0x6c22, 0x800, 0x2, 0x2, 0x457}, &(0x7f0000000140)=0x14) sendto$inet6(r1, &(0x7f0000000300)="030300000300600000000100fff55b4202938207d9fb0380398d5375000011007929300ee616d5c01843e06590080053118f118d0000f5cfe606f6925cbf34658ea111797b1abc5dc62600409b000000faffffff00000000aeb45554e779d530ec5046000000000000000000", 0x6c, 0x0, 0x0, 0x0) 15:04:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x8001, 0x10000) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x220000) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000700)={0x34, 0x0, &(0x7f0000000640)}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) sendfile(r0, r1, &(0x7f0000000240), 0x2000010200000b) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) creat(&(0x7f00000006c0)='./bus\x00', 0x1) request_key(&(0x7f0000000580)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000740)='cpusetnodevvboxnet1mime_typeppp1-)vboxnet1+\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) io_submit(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 15:04:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x1, 0x105080) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000000)={0x64763bc5, 0x1}) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000300)={0x0, 0x1ff}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000580)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, 0x0, &(0x7f0000000240)) poll(&(0x7f0000000000), 0x1, 0x0) r3 = memfd_create(&(0x7f00000000c0)='/dev/loop#\x00', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000640)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(r0, r1, 0x0, 0x102000002) 15:04:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0xc4, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$int_in(r0, 0x800000c0045005, 0x0) getpgrp(0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x18b) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r2}) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000280), 0x4) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f00000000c0)) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000040)={0x0, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(0xffffffffffffffff, 0x3, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xf7fffffffffffffd, 0x2012, r1, 0x0) unshare(0x40000000) 15:04:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 215.590178][ T7937] sched: DL replenish lagged too much [ 215.678038][ T7937] IPVS: ftp: loaded support on port[0] = 21 15:04:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000000c0)=[0x9a7]) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 216.020348][ T7946] IPVS: ftp: loaded support on port[0] = 21 15:04:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 216.097630][ T2490] print_req_error: I/O error, dev loop0, sector 0 flags 801 15:04:42 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x202000) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x400040) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000180)) 15:04:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_buf(r0, 0x0, 0x3c, &(0x7f00000000c0)="f96d009224b841d22db2cb8124d382e2186c6fe885b216d9f100c90b2dbebca494ae1dc4960bc04dd74a17a3ac4a26064b893355b5294fccc033e7bf9578ed0104ec19701ea86bec18b701b7fc0f6deb2169fe0301abc36db9a6a6270d0e7d0b556a7722e05838837c6df257a0a55a01fee77584967581c1708312f567225cd2fe7830984f57c0b12c27b6e0701f4d0258b3fb58da6763a9b11b24b9465f7a7ee7bfc639b3c3e1534a43b7b64866d0d7f0c7793d7b93d0e6a8749330429f81a0cef60c2d8ef1d5bd4a8bec6ddd42aaed9d822f39bba3486d7d9e7ae8c0999ceda7b22e593249a19fcd3e9834f3de87b420ad19ccbfadae017c", 0xf9) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$sock_void(r3, 0x1, 0x1b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x76, &(0x7f0000000080)={0x2}, 0x8) close(r3) close(r2) 15:04:42 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x202000) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x400040) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000180)) 15:04:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x8001, 0x10000) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x220000) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000700)={0x34, 0x0, &(0x7f0000000640)}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) sendfile(r0, r1, &(0x7f0000000240), 0x2000010200000b) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) creat(&(0x7f00000006c0)='./bus\x00', 0x1) request_key(&(0x7f0000000580)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000740)='cpusetnodevvboxnet1mime_typeppp1-)vboxnet1+\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) io_submit(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 15:04:42 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x10000003f) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) 15:04:42 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000000200)='/', 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) setpgid(r2, r3) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) msgsnd(0x0, &(0x7f0000000d00), 0x2000, 0x0) 15:04:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 216.524936][ T2490] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 216.532827][ T2490] Buffer I/O error on dev loop0, logical block 0, lost async page write [ 216.541411][ T2490] print_req_error: I/O error, dev loop0, sector 8 flags 801 [ 216.548720][ T2490] Buffer I/O error on dev loop0, logical block 1, lost async page write 15:04:43 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_buf(r0, 0x0, 0x3c, &(0x7f00000000c0)="f96d009224b841d22db2cb8124d382e2186c6fe885b216d9f100c90b2dbebca494ae1dc4960bc04dd74a17a3ac4a26064b893355b5294fccc033e7bf9578ed0104ec19701ea86bec18b701b7fc0f6deb2169fe0301abc36db9a6a6270d0e7d0b556a7722e05838837c6df257a0a55a01fee77584967581c1708312f567225cd2fe7830984f57c0b12c27b6e0701f4d0258b3fb58da6763a9b11b24b9465f7a7ee7bfc639b3c3e1534a43b7b64866d0d7f0c7793d7b93d0e6a8749330429f81a0cef60c2d8ef1d5bd4a8bec6ddd42aaed9d822f39bba3486d7d9e7ae8c0999ceda7b22e593249a19fcd3e9834f3de87b420ad19ccbfadae017c", 0xf9) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$sock_void(r3, 0x1, 0x1b, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x76, &(0x7f0000000080)={0x2}, 0x8) close(r3) close(r2) 15:04:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 216.568384][ T2489] print_req_error: I/O error, dev loop0, sector 16 flags 801 [ 216.576366][ T2489] Buffer I/O error on dev loop0, logical block 2, lost async page write 15:04:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x8001, 0x10000) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x220000) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000700)={0x34, 0x0, &(0x7f0000000640)}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) sendfile(r0, r1, &(0x7f0000000240), 0x2000010200000b) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) creat(&(0x7f00000006c0)='./bus\x00', 0x1) request_key(&(0x7f0000000580)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000740)='cpusetnodevvboxnet1mime_typeppp1-)vboxnet1+\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) io_submit(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 15:04:43 executing program 4: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x400000, 0x0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x202000) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x401, 0x400040) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000180)) 15:04:43 executing program 1: r0 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:43 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x73}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000200)=""/195}, 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x8, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000300), &(0x7f0000000340)) 15:04:43 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9943, 0x100) write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x1, 0x0, 0x6}}, 0x14) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) fanotify_mark(r2, 0x90, 0x0, 0xffffffffffffffff, 0x0) [ 216.954479][ T2489] print_req_error: I/O error, dev loop0, sector 0 flags 801 [ 216.961886][ T2489] Buffer I/O error on dev loop0, logical block 0, lost async page write 15:04:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = geteuid() r2 = accept(r0, &(0x7f0000000680)=@in={0x2, 0x0, @remote}, &(0x7f0000000700)=0x80) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f00000017c0)) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x7, &(0x7f0000000500)=[{&(0x7f00000000c0)="7b122f06c1db4a2af87989fd75595151cc8afdcc624361f61f261c26a24b882dc53a2e77127ff0ae044dbf03aa0516c038df9a6a7ee58554e0a5c261cfd914fd14da3da3efef6f69a2bd8537524de4ad2b62b79b42c82c66", 0x58, 0x9}, {&(0x7f0000000140)="7f3b0f1399dc65ee4f0cf92b0b2b9bb542aa23eadcc908ad7249978fc052f77611acbfb95e9f2181df6b620653ecdeeef5e4c2e6b0a4977a88b4513eda73b03e2631ca36e2f865fc3d5a74db820529e431e9d4f47aae622a70083426350ba022edf27385450c110feb8623c68bfb694b6f2bedf8568b1d7aabf8ded9ee1b2861a62c7530cc9d56b5d67b2ca77c126982546c5be13e5740d696ab5f04a230ee7b8dac68c046ccc7b6ccc90bac17e926e9251876e4e6a1a9dadfc004d96ff9720a18f776ca8e5d7bd906bd34d70c02add4bb5bad15bb96920248e33f517c61c0c4e7fd7238d86c13497514c3f09c320b352bb7f03ab4f5a6ce7c", 0xf9, 0x40}, {&(0x7f0000000240)="f56afe75168bc6814d46612d092fa63fc07c5c64cf7097c46a82d05d8f9da862ec5656a4bb8d3f41575c43820b2e3c1e9fc44c1fef038fb4b97909d3c14e18ab43e866437b2535d92a04084fb2e9ef67f7eeb53cde20", 0x56, 0x6}, {&(0x7f00000007c0)="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", 0x1000, 0x81}, {&(0x7f00000002c0)="b6b95435c01f95f69a560111c06bb9e696f6860d9263c3ad7cbdabb61ba478c677e67f1b6da826171a71d74b2f52c6e063de7a8df1b97f79d19f3dcc5c5869f7e1eb5289d7893380ee5e0c0f9a11f1f8b16e9a5fd6707975560a67b3e2e23957e29ba70d69a4", 0x66, 0x5e8}, {&(0x7f0000000340)="7c2cde51f09b8b58629eda6053c693fcab50e431378104e9bcef485eecbfff467fcd538f34ac38682bf72bcdc14d258f04dd17342dd02263b7e1d38201422c269da66777e665abdb2f91eb62b6179d1919b2d4cc2fe214ca43233db284effa351d8fbe51f4eaa259e189b605e10287c807c7fd6f24721f183854def144dcd3d80108952dc8cd5dd11a417b232b695661a75d97a64c36dc6b67603e4f2499e08c05a2bf781c2a48a858fb7592ef0ce7304701ba5da5954fe1605ebad316aa4c00a523849938dfad2a1c7dc783d393ed604f1b1f16671bf5219227a1443a23cba2c3", 0xe1, 0x8001}, {&(0x7f0000000440)="b0e10f55830d6cfe490b20fd17289d3200cd9cf9ebdac8f3b56ffd0ef24997748769235d4ff1f41eb4a509ef7a08dae658d793148d1ad4877e00c1f9886adbf62efb8aebe2974939319231ab031e84ea7472a6c9a4b2ad91cbe170e6e82f50c893e43a3c645025231320b6d69688439d6a7b90a1086409a743415d5b144c5ad40dc6fc09cb3750227af6b48b2bb3b6b7", 0x90, 0x85f6}], 0x30000, &(0x7f00000005c0)={[{@acl='acl'}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x8}}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x9}}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@noacl='noacl'}, {@noacl='noacl'}], [{@smackfsroot={'smackfsroot'}}, {@subj_type={'subj_type', 0x3d, '\''}}, {@fowner_eq={'fowner', 0x3d, r1}}]}) msgctl$IPC_SET(0x0, 0xd, &(0x7f0000000740)) 15:04:43 executing program 1: r0 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:43 executing program 3: r0 = epoll_create1(0x80000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) migrate_pages(0x0, 0x0, 0x0, &(0x7f0000000240)) fcntl$setsig(r1, 0xa, 0x13) r3 = socket$kcm(0x29, 0x7, 0x0) signalfd4(r3, &(0x7f0000000000)={0x8}, 0x8, 0x80000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) r4 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x00\x00\x02\x00\x00\x05\x00', 0x79}) 15:04:43 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_flowlabel\x00') ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000400)={0x9, 0x4, 0x4}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8080000}, 0xc, &(0x7f0000000280)={&(0x7f0000000980)=ANY=[@ANYBLOB="722772ef130e9c2d4a4011ba49eb7bbb39f27838b686e3dad85758df210f6ddf2d36571d6f99c5cf60dd46fcf77f0abfdf4da88820627218b443b5aba33d59cd8afe23c26606bbe8921f3a25dd42dccd0529ca09c32cae9ddd3897ad8fd311e770a1ff2d8d701ff1", @ANYRES16=r2, @ANYBLOB="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"], 0x170}, 0x1, 0x0, 0x0, 0x8004}, 0x40000) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x4, 0x7, 0x6}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={r4, 0x3b}, 0x8) write$apparmor_current(r3, &(0x7f0000000480)=@profile={'permprofile ', ':\"//em0ppp1vboxnet0-user\x00'}, 0x25) getsockopt$sock_buf(r1, 0x1, 0x3f, &(0x7f00000004c0)=""/74, &(0x7f0000000440)=0x4a) stat(&(0x7f0000000940)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) fchownat(r1, &(0x7f0000000140)='./file0\x00', r5, r6, 0x1000) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000700), &(0x7f0000000740)=0x10) 15:04:43 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x73}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000200)=""/195}, 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x8, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000300), &(0x7f0000000340)) 15:04:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x8001, 0x10000) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x220000) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000700)={0x34, 0x0, &(0x7f0000000640)}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000005c0)=0x14) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40, 0x0) sendfile(r0, r1, &(0x7f0000000240), 0x2000010200000b) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) creat(&(0x7f00000006c0)='./bus\x00', 0x1) request_key(&(0x7f0000000580)='rxrpc\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f0000000740)='cpusetnodevvboxnet1mime_typeppp1-)vboxnet1+\x00', 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) io_submit(0x0, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 217.366370][ T26] audit: type=1400 audit(1552921483.941:31): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=8054 comm="syz-executor.4" 15:04:44 executing program 1: r0 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:44 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x73}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000200)=""/195}, 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', 0x0, 0x8, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000300), &(0x7f0000000340)) 15:04:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='\x00I3\x17|\xb63\xf9\xa3[\xe9\xf1\xf2\xa9\xc2\x03\x96\x83\xa2M!\x9b\xc50\x10\xfe\xa3\xa8\x93\x018w{\x8f\x19\xc5\xf8\xc0\xb3\x00\x00]7\x997L,\xb9~\x85xfh\x9dg\x83S\x98\x86\xa4\xec\x8a\x02\x87\xcb\x99') r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) ftruncate(r1, 0x10000) r2 = open(&(0x7f0000000080)='./bus\x00', 0x101022, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = open(&(0x7f0000005a40)='./bus\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) sendfile(r1, r3, 0x0, 0x8000fffffffe) r4 = openat$cgroup_ro(r0, &(0x7f00000005c0)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x03\x00\x00\x00\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) 15:04:44 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:44 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xca, &(0x7f0000ee5000)={{0xa, 0x100000, 0x0, @loopback}, {0xa, 0x0, 0x0, @initdev}}, 0x5c) 15:04:44 executing program 3: r0 = epoll_create1(0x80000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) migrate_pages(0x0, 0x0, 0x0, &(0x7f0000000240)) fcntl$setsig(r1, 0xa, 0x13) r3 = socket$kcm(0x29, 0x7, 0x0) signalfd4(r3, &(0x7f0000000000)={0x8}, 0x8, 0x80000) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) r4 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r4, 0x8922, &(0x7f0000000040)={'team0\x00\x00\x00\x00\x02\x00\x00\x05\x00', 0x79}) [ 217.920387][ T2489] print_req_error: I/O error, dev loop0, sector 128 flags 801 [ 217.928063][ T2489] Buffer I/O error on dev loop0, logical block 16, lost async page write [ 218.062491][ T26] audit: type=1804 audit(1552921484.641:32): pid=8088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir721242086/syzkaller.x6F2io/10/bus" dev="sda1" ino=16551 res=1 15:04:44 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:44 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) r0 = msgget(0x1, 0x364) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/214) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) 15:04:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000)=0x7, 0x4) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) 15:04:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2f) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2000, 0xd35870307d33cff7) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x4) r3 = dup(r1) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) write$uinput_user_dev(r3, &(0x7f0000000980)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_DEV_CREATE(r2, 0x5501) 15:04:44 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000480)=0xc0000000000000) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10004, 0xeefffdef) close(r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000440)) sendmsg$alg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="bd8c8f24b95b402073cfd340e41396a2392d7b3d4773d2c165e5d5c53b92d979560f2c07035033cd1ce17a00b2b95d1133", 0x31}, {&(0x7f0000000080)="84a2", 0x2}, {&(0x7f0000000180)="cd92a6906e5ef2f6c87dc38e42807d01fd3b48ee749e73229e1ebb5f5681325e53dcba138b453e5700c979985c2188f7e9b0394577babf68c55b965fd94c382c89cf871b35667627bbed706f54359bf92def783e052b2d0512807f30daf9618e68699f33bd4959360b6110063e130f1139e6e7dc7075ce0b1eb5dbb40044224be33a03a272789a6182bfc03c997fd7fdd625ff51eced9acba691a9167fe8641be11e5078a1f6ba32c2847fa9b604d4a268d58632c57669af9c7fc44a3f3ebad20cc7850f0caa7ebadd7eb5586d4ea3abefdc02062cc8e9972bf274", 0xdb}, {&(0x7f0000000280)="3f19a4b77104674e600e6fab697e64025bc4dc0bd873b10dcd978ae255ef24c09d770f8ac3690efdf694d7bad899dbe88e5e0befef4779df8a831b6c010457a285b2d29b9931b40d1b2652561c38", 0x4e}, {&(0x7f0000000300)="667215a375bc05ada9c2ba3777fe02135aefdf6354167e398c853e1fb2ff730905e3ef49bc6fa36373072e4be51a8ab4dfdb228469c7a1c05800788130a95acf175a7d50150da098d143449f4b2173ae8e1d", 0x52}], 0x5, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1260, 0x4000004}, 0x4000000) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6", 0x3) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000004c0)={0x15, 0x19, 0x5, 0x13, 0x4, 0xb3e7, 0x4, 0x14e, 0xffffffffffffffff}) 15:04:44 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000400)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000)=0x7, 0x4) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) [ 218.369112][ T26] audit: type=1804 audit(1552921484.941:33): pid=8088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir721242086/syzkaller.x6F2io/10/bus" dev="sda1" ino=16551 res=1 15:04:45 executing program 4: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) r0 = msgget(0x1, 0x364) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/214) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) [ 218.505135][ T26] audit: type=1804 audit(1552921484.981:34): pid=8118 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir721242086/syzkaller.x6F2io/10/bus" dev="sda1" ino=16551 res=1 15:04:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="ff8ccd3c1070876e7598b124"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 15:04:45 executing program 3: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) r0 = msgget(0x1, 0x364) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/214) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000003c0)) 15:04:45 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000280)=""/9, 0x9}, {&(0x7f00000002c0)=""/122, 0x7a}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000380)=""/69, 0x45}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/142, 0x8e}, {&(0x7f0000000500)=""/188, 0xbc}, {&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000680)=""/116, 0x74}, {&(0x7f0000000700)=""/227, 0xe3}], 0xa, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="080327bd70000000000001000000000000000b000000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x10) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000240)={0x7fffffff, 0x8001, 0x1b400}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x100020, 0x0) 15:04:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaabb0180c20000008100000086dd6008c97e00100000fe80000000000000000000000000aa00000000000000000000000000000001000000000401907800d35d2e00ab5f3800"], 0x0) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000040)=0x100, 0x4) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x5040, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030303030322c6d6f64653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303030303030303030303132352c6673757569643d75676661643737352d370000772d763400328058576b3952f78bfc821f6d2d513274752d34628061307535002c646f6e745f686173682c646566636f6e746578743d73746166665f752c00"]) 15:04:45 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 218.675647][ T8139] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 15:04:45 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 218.781257][ T8139] *** Guest State *** [ 218.791912][ T8139] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 218.817456][ T8139] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 218.830505][ T8139] CR3 = 0x0000000000000000 [ 218.835811][ T8139] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 218.865690][ T8139] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 218.885878][ T8139] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 218.914050][ T8139] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 15:04:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x7530}}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000000)=""/107) r2 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x200000) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f0000000200)={0x3}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002180)=@newae={0x5c, 0x1e, 0x713, 0x0, 0x0, {{@in6=@ipv4={[], [], @initdev}}, @in=@remote}, [@replay_esn_val={0x1c}]}, 0x5c}, 0x8}, 0x0) [ 218.954775][ T8139] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 218.980155][ T8139] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 219.003275][ T8139] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 219.024380][ T8139] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 219.045794][ T8139] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 219.073843][ T8139] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 219.098715][ T8139] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 15:04:45 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000480)=0xc0000000000000) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10004, 0xeefffdef) close(r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000440)) sendmsg$alg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="bd8c8f24b95b402073cfd340e41396a2392d7b3d4773d2c165e5d5c53b92d979560f2c07035033cd1ce17a00b2b95d1133", 0x31}, {&(0x7f0000000080)="84a2", 0x2}, {&(0x7f0000000180)="cd92a6906e5ef2f6c87dc38e42807d01fd3b48ee749e73229e1ebb5f5681325e53dcba138b453e5700c979985c2188f7e9b0394577babf68c55b965fd94c382c89cf871b35667627bbed706f54359bf92def783e052b2d0512807f30daf9618e68699f33bd4959360b6110063e130f1139e6e7dc7075ce0b1eb5dbb40044224be33a03a272789a6182bfc03c997fd7fdd625ff51eced9acba691a9167fe8641be11e5078a1f6ba32c2847fa9b604d4a268d58632c57669af9c7fc44a3f3ebad20cc7850f0caa7ebadd7eb5586d4ea3abefdc02062cc8e9972bf274", 0xdb}, {&(0x7f0000000280)="3f19a4b77104674e600e6fab697e64025bc4dc0bd873b10dcd978ae255ef24c09d770f8ac3690efdf694d7bad899dbe88e5e0befef4779df8a831b6c010457a285b2d29b9931b40d1b2652561c38", 0x4e}, {&(0x7f0000000300)="667215a375bc05ada9c2ba3777fe02135aefdf6354167e398c853e1fb2ff730905e3ef49bc6fa36373072e4be51a8ab4dfdb228469c7a1c05800788130a95acf175a7d50150da098d143449f4b2173ae8e1d", 0x52}], 0x5, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1260, 0x4000004}, 0x4000000) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6", 0x3) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000004c0)={0x15, 0x19, 0x5, 0x13, 0x4, 0xb3e7, 0x4, 0x14e, 0xffffffffffffffff}) 15:04:45 executing program 1: add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 219.153074][ T8139] IDTR: limit=0x0000ffff, base=0x0000000000000000 15:04:45 executing program 1: add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) [ 219.196129][ T8139] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 219.222583][ T8142] EXT4-fs (sda1): re-mounted. Opts: [ 219.233488][ T8139] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 219.274118][ T8139] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 219.306662][ T8139] Interruptibility = 00000000 ActivityState = 00000000 15:04:45 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000480)=0xc0000000000000) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf10004, 0xeefffdef) close(r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000440)) sendmsg$alg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="bd8c8f24b95b402073cfd340e41396a2392d7b3d4773d2c165e5d5c53b92d979560f2c07035033cd1ce17a00b2b95d1133", 0x31}, {&(0x7f0000000080)="84a2", 0x2}, {&(0x7f0000000180)="cd92a6906e5ef2f6c87dc38e42807d01fd3b48ee749e73229e1ebb5f5681325e53dcba138b453e5700c979985c2188f7e9b0394577babf68c55b965fd94c382c89cf871b35667627bbed706f54359bf92def783e052b2d0512807f30daf9618e68699f33bd4959360b6110063e130f1139e6e7dc7075ce0b1eb5dbb40044224be33a03a272789a6182bfc03c997fd7fdd625ff51eced9acba691a9167fe8641be11e5078a1f6ba32c2847fa9b604d4a268d58632c57669af9c7fc44a3f3ebad20cc7850f0caa7ebadd7eb5586d4ea3abefdc02062cc8e9972bf274", 0xdb}, {&(0x7f0000000280)="3f19a4b77104674e600e6fab697e64025bc4dc0bd873b10dcd978ae255ef24c09d770f8ac3690efdf694d7bad899dbe88e5e0befef4779df8a831b6c010457a285b2d29b9931b40d1b2652561c38", 0x4e}, {&(0x7f0000000300)="667215a375bc05ada9c2ba3777fe02135aefdf6354167e398c853e1fb2ff730905e3ef49bc6fa36373072e4be51a8ab4dfdb228469c7a1c05800788130a95acf175a7d50150da098d143449f4b2173ae8e1d", 0x52}], 0x5, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0x1260, 0x4000004}, 0x4000000) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6", 0x3) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000004c0)={0x15, 0x19, 0x5, 0x13, 0x4, 0xb3e7, 0x4, 0x14e, 0xffffffffffffffff}) [ 219.336199][ T8139] *** Host State *** [ 219.347108][ T8150] EXT4-fs (sda1): re-mounted. Opts: [ 219.376764][ T8139] RIP = 0xffffffff811b40b0 RSP = 0xffff8880554b78e0 [ 219.426562][ T8139] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 219.490254][ T8139] FSBase=00007f747c89f700 GSBase=ffff8880ae900000 TRBase=fffffe0000033000 [ 219.526985][ T8139] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 219.540536][ T8139] CR0=0000000080050033 CR3=000000008f54c000 CR4=00000000001426e0 [ 219.594451][ T8139] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 219.610408][ T8139] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 219.628123][ T8139] *** Control State *** [ 219.641424][ T8139] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 219.665794][ T8139] EntryControls=0000d1ff ExitControls=002fefff [ 219.685835][ T8139] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 219.706953][ T8139] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 219.726329][ T8139] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 219.754729][ T8139] reason=80000021 qualification=0000000000000000 [ 219.779928][ T8139] IDTVectoring: info=00000000 errcode=00000000 [ 219.791284][ T8139] TSC Offset = 0xffffff87a3a70189 [ 219.796860][ T8139] EPT pointer = 0x000000009252201e 15:04:46 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x10000, 0x200000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @multicast2}}, [0x4fb, 0x80000001, 0x1, 0x6, 0x2, 0xd0cb, 0x8000, 0xb4e, 0x7ff, 0x9, 0x1, 0x9, 0x8, 0x92d, 0x6]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e22, @multicast1}}, 0x4, 0x9}, 0x90) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x9, 0x0, &(0x7f0000000040)) 15:04:46 executing program 3: syz_emit_ethernet(0xac, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0805030017096f18804dda383d0f33464e66343ed4384a368c2b998ab35191beac82f2394bcac97e961aa61aef277f269703a84bb65541b64172f9a0781fc37544ade6e5d95cb9dddf000b261c77a61223a1549b7fd9a29a0208c6a8ecdaff2080f5d19ffe9cb89634eb9564557218135b7005f15fa862df1c4b2e153bbc82acbd4621666776452f99b3a0e70bf0bc26ace44b07d1b7f86fdd5462b41a000000"], 0x0) 15:04:46 executing program 1: add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000100)='\x00', &(0x7f0000000140)) 15:04:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000280)=""/9, 0x9}, {&(0x7f00000002c0)=""/122, 0x7a}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000380)=""/69, 0x45}, {&(0x7f0000000400)=""/35, 0x23}, {&(0x7f0000000440)=""/142, 0x8e}, {&(0x7f0000000500)=""/188, 0xbc}, {&(0x7f00000005c0)=""/135, 0x87}, {&(0x7f0000000680)=""/116, 0x74}, {&(0x7f0000000700)=""/227, 0xe3}], 0xa, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="080327bd70000000000001000000000000000b000000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x10) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000240)={0x7fffffff, 0x8001, 0x1b400}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x100020, 0x0) 15:04:46 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x80e) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x24, &(0x7f00000007c0)=0x8, 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x6], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 15:04:46 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, 0x0, &(0x7f0000000140)) 15:04:46 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000500)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendto(r1, &(0x7f0000000200)="ce", 0x1, 0x20000004, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1e, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) [ 220.028879][ T8192] EXT4-fs (sda1): re-mounted. Opts: 15:04:46 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, 0x0, &(0x7f0000000140)) 15:04:46 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='\n\x00\x00\x00\x00\x00\x00\n\x00', 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x1}, 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x13, &(0x7f0000000040), 0x3d2) close(r1) 15:04:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffeb0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x1ff}}}, &(0x7f0000000780)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x7}, 0x8) bind$netlink(r3, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x400401}, 0xfffffffffffffffc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x1, r0}) r5 = getpgrp(0x0) setxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64\x00', &(0x7f0000000940)='team0\x00', 0x6, 0x1) ioprio_set$pid(0x1, r5, 0xc3) fallocate(r1, 0x20000000200004, 0x1, 0xffffffdffffffc00) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) sendmsg$nl_generic(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="1ab5ed587bc261"], 0x14}}, 0xa1a80ebfc9a59709) ioctl$KDMKTONE(r3, 0x4b30, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000980)={0x10000, 0x1f, 0x6}) getpeername$inet(r0, &(0x7f0000000840)={0x2, 0x0, @multicast1}, &(0x7f0000000880)=0x10) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@remote={0xfe, 0x80, [0x0, 0x2a8, 0x0, 0x0, 0x8000a0ffffffff, 0x16f, 0x0, 0x0, 0x14]}, 0x8, r7}) signalfd4(r6, &(0x7f0000000280)={0xffffffffffffffc0}, 0x8, 0x80804) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000640)={{0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x96, @remote, 0xffffffffffffff17}, 0x8, [0x4f0, 0xfc, 0x3, 0x5, 0x10001, 0xfff, 0x2, 0x81bb]}, 0x5c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000800)={0x9, 0x3}) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 15:04:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) r2 = shmat(r1, &(0x7f0000ffa000/0x4000)=nil, 0x7000) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) inotify_init1(0x800) shmdt(r2) 15:04:46 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, 0x0, &(0x7f0000000140)) 15:04:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) setrlimit(0x4000000007, &(0x7f0000000200)={0x6, 0x7}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) capset(&(0x7f0000000100)={0x80000020080522, r3}, &(0x7f0000000140)={0x1, 0x7, 0x1, 0x8, 0x6, 0x5}) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0xffffffffffffff4a, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x840000000000, 0x0) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "652e3d0ef844bb57aebb1deeb8643b87f2862aed40a638c74e0bd387351db125", 0x1, 0xbf81, 0x80000001, 0x8001, 0x1}) 15:04:47 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000500)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendto(r1, &(0x7f0000000200)="ce", 0x1, 0x20000004, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1e, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 15:04:47 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000500)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendto(r1, &(0x7f0000000200)="ce", 0x1, 0x20000004, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1e, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 15:04:47 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:47 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, &(0x7f0000000500)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xfffffffffffffe6d) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x14', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='Rcrist\xe3cusgrVid:De', 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendto(r1, &(0x7f0000000200)="ce", 0x1, 0x20000004, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x1e, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) 15:04:47 executing program 4: futex(0x0, 0x8c, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x20000000000001, 0x4) 15:04:47 executing program 1 (fault-call:1 fault-nth:0): r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:47 executing program 2: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x362) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000080)=0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x7) r3 = dup(r2) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r2) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000140)={0x2, 0x9}) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000240)) r5 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x4, 0x2, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x4, 0x2, 0xba, 0x10000, 0x1, 0x4, 0x5, 0xfffffffffffffc00, 0x80, 0x81, 0x8, 0x4, 0x5, 0x8, 0xd756, 0xd2, 0x5c24a52f, 0xff, 0x5, 0x800, 0x100000001, 0x9, 0x100000001, 0x7fffffff, 0x6, 0x7f, 0x7f, 0x32d0, 0x2cf, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x104, 0x5, 0x1, 0x2, 0xe86, 0x7f, 0xffffffffffffffc1}, r5, 0x3, r1, 0x3) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) [ 220.829573][ T8270] FAULT_INJECTION: forcing a failure. [ 220.829573][ T8270] name failslab, interval 1, probability 0, space 0, times 1 [ 220.906023][ T8270] CPU: 1 PID: 8270 Comm: syz-executor.1 Not tainted 5.1.0-rc1-next-20190318 #5 [ 220.915094][ T8270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.928554][ T8270] Call Trace: [ 220.928593][ T8270] dump_stack+0x172/0x1f0 [ 220.928615][ T8270] should_fail.cold+0xa/0x15 [ 220.928634][ T8270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 220.928656][ T8270] ? ___might_sleep+0x163/0x280 [ 220.928676][ T8270] __should_failslab+0x121/0x190 [ 220.928697][ T8270] should_failslab+0x9/0x14 [ 220.928718][ T8270] __kmalloc_track_caller+0x2d8/0x740 [ 220.928733][ T8270] ? get_pid_task+0xc9/0x190 [ 220.928757][ T8270] ? find_held_lock+0x35/0x130 [ 220.928773][ T8270] ? strndup_user+0x77/0xd0 [ 220.928791][ T8270] memdup_user+0x26/0xb0 [ 220.951918][ T8270] strndup_user+0x77/0xd0 [ 220.951937][ T8270] keyctl_pkey_params_get+0xce/0x460 [ 220.951954][ T8270] ? __keyctl_dh_compute.cold+0x43/0x43 15:04:47 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x4, 0x1, 0x1200000, 0x3}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x8, 0x3}, 0x8) socket$rds(0x15, 0x5, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x80, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="a958000000000000000200000000000000080ffc070091d66d16f916ed051bb1a8fb4eefa9278173162ba847ee90dbf15092a0a4e8586cd7d3fbc2f69f85455b5dd54de03d393adf49cf91dafa44d5bbd9cdc714ece1fe35bb197c78b91ccb525b791b89b34dc4e0c01a8bd8a4e197108f741815b4af1441529edd9dea35e637be6cade31563047a9b09dd2c97318760b0cba53ce8bef819f232edf42cc1da399164a82db7319e2ecb241e08acf2a49221017fc018ec48216e877b96101b8ad38b0da7ed17d8066213a14c1130960bd0a22e6c6d810a70ad7347f078211bb90f020a8881b00f12497777d08c4ee1c90537e29133e88145b3b100"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) fchmod(r3, 0x48) [ 220.951985][ T8270] ? kasan_check_write+0x14/0x20 [ 220.952004][ T8270] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 220.952028][ T8270] keyctl_pkey_query+0xb3/0x220 [ 220.952044][ T8270] ? keyctl_pkey_params_get_2+0x390/0x390 [ 220.952059][ T8270] ? fput+0x1b/0x20 [ 220.952086][ T8270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.007359][ T8270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.007375][ T8270] ? do_syscall_64+0x26/0x610 [ 221.007392][ T8270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.007406][ T8270] ? do_syscall_64+0x26/0x610 [ 221.007428][ T8270] __x64_sys_keyctl+0x144/0x420 [ 221.007459][ T8270] do_syscall_64+0x103/0x610 [ 221.007489][ T8270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.007502][ T8270] RIP: 0033:0x458079 [ 221.007516][ T8270] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.007525][ T8270] RSP: 002b:00007f1f3ad55c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 221.043506][ T8270] RAX: ffffffffffffffda RBX: 00007f1f3ad55c90 RCX: 0000000000458079 [ 221.043516][ T8270] RDX: 0000000000000000 RSI: 0000000027dfd228 RDI: 0000000000000018 [ 221.043523][ T8270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 221.043530][ T8270] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1f3ad566d4 [ 221.043537][ T8270] R13: 00000000004c39d6 R14: 00000000004d68c0 R15: 0000000000000003 15:04:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffeb0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x1ff}}}, &(0x7f0000000780)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x7}, 0x8) bind$netlink(r3, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x400401}, 0xfffffffffffffffc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x1, r0}) r5 = getpgrp(0x0) setxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64\x00', &(0x7f0000000940)='team0\x00', 0x6, 0x1) ioprio_set$pid(0x1, r5, 0xc3) fallocate(r1, 0x20000000200004, 0x1, 0xffffffdffffffc00) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) sendmsg$nl_generic(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="1ab5ed587bc261"], 0x14}}, 0xa1a80ebfc9a59709) ioctl$KDMKTONE(r3, 0x4b30, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000980)={0x10000, 0x1f, 0x6}) getpeername$inet(r0, &(0x7f0000000840)={0x2, 0x0, @multicast1}, &(0x7f0000000880)=0x10) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@remote={0xfe, 0x80, [0x0, 0x2a8, 0x0, 0x0, 0x8000a0ffffffff, 0x16f, 0x0, 0x0, 0x14]}, 0x8, r7}) signalfd4(r6, &(0x7f0000000280)={0xffffffffffffffc0}, 0x8, 0x80804) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000640)={{0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x96, @remote, 0xffffffffffffff17}, 0x8, [0x4f0, 0xfc, 0x3, 0x5, 0x10001, 0xfff, 0x2, 0x81bb]}, 0x5c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000800)={0x9, 0x3}) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 15:04:48 executing program 3: r0 = socket$inet(0x10, 0x802, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 15:04:48 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sched_setparam(r0, &(0x7f00000003c0)=0x8) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c227486d91af170c5da86362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476ae772b1fde29f0c4a5615"], @ANYRESDEC=r2]], 0x8}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000340)={r4, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 15:04:48 executing program 1 (fault-call:1 fault-nth:1): r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:48 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffeb0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x1ff}}}, &(0x7f0000000780)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x7}, 0x8) bind$netlink(r3, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x400401}, 0xfffffffffffffffc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x1, r0}) r5 = getpgrp(0x0) setxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64\x00', &(0x7f0000000940)='team0\x00', 0x6, 0x1) ioprio_set$pid(0x1, r5, 0xc3) fallocate(r1, 0x20000000200004, 0x1, 0xffffffdffffffc00) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) sendmsg$nl_generic(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="1ab5ed587bc261"], 0x14}}, 0xa1a80ebfc9a59709) ioctl$KDMKTONE(r3, 0x4b30, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000980)={0x10000, 0x1f, 0x6}) getpeername$inet(r0, &(0x7f0000000840)={0x2, 0x0, @multicast1}, &(0x7f0000000880)=0x10) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@remote={0xfe, 0x80, [0x0, 0x2a8, 0x0, 0x0, 0x8000a0ffffffff, 0x16f, 0x0, 0x0, 0x14]}, 0x8, r7}) signalfd4(r6, &(0x7f0000000280)={0xffffffffffffffc0}, 0x8, 0x80804) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000640)={{0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x96, @remote, 0xffffffffffffff17}, 0x8, [0x4f0, 0xfc, 0x3, 0x5, 0x10001, 0xfff, 0x2, 0x81bb]}, 0x5c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000800)={0x9, 0x3}) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) [ 221.510305][ T8302] [ 221.536362][ T8302] ============================= 15:04:48 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 221.567250][ T8302] WARNING: suspicious RCU usage [ 221.582373][ T8302] 5.1.0-rc1-next-20190318 #5 Not tainted [ 221.588150][ T8302] ----------------------------- 15:04:48 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 221.653331][ T8302] net/xfrm/xfrm_user.c:1080 suspicious rcu_dereference_check() usage! [ 221.702470][ T8302] [ 221.702470][ T8302] other info that might help us debug this: [ 221.702470][ T8302] [ 221.715613][ T8315] overlayfs: failed to resolve './file1': -2 15:04:48 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x2, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 221.768242][ T8302] [ 221.768242][ T8302] rcu_scheduler_active = 2, debug_locks = 1 [ 221.788852][ T8302] 1 lock held by syz-executor.3/8302: [ 221.798579][ T8302] #0: 000000005905cb34 (&net->xfrm.xfrm_cfg_mutex){+.+.}, at: xfrm_netlink_rcv+0x61/0x90 [ 221.876012][ T8302] [ 221.876012][ T8302] stack backtrace: [ 221.895375][ T8302] CPU: 1 PID: 8302 Comm: syz-executor.3 Not tainted 5.1.0-rc1-next-20190318 #5 [ 221.904355][ T8302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.904375][ T8302] Call Trace: [ 221.904409][ T8302] dump_stack+0x172/0x1f0 [ 221.904434][ T8302] lockdep_rcu_suspicious+0x153/0x15d [ 221.904452][ T8302] xfrm_get_spdinfo+0x923/0xb20 [ 221.904479][ T8302] ? xfrm_send_state_notify+0x1b90/0x1b90 [ 221.938507][ T8302] ? audit_add_tree_rule+0x520/0xbc0 [ 221.943828][ T8302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.943844][ T8302] ? __nla_parse+0x12a/0x340 [ 221.943869][ T8302] ? nla_parse+0x45/0x60 [ 221.943887][ T8302] ? xfrm_send_state_notify+0x1b90/0x1b90 [ 221.943900][ T8302] xfrm_user_rcv_msg+0x458/0x770 [ 221.943916][ T8302] ? xfrm_dump_sa_done+0xf0/0xf0 [ 221.943937][ T8302] ? mark_held_locks+0xf0/0xf0 [ 221.943949][ T8302] ? lockdep_hardirqs_on+0x418/0x5d0 [ 221.943993][ T8302] ? __mutex_lock+0x3cd/0x1310 [ 221.944019][ T8302] ? xfrm_netlink_rcv+0x61/0x90 [ 221.965477][ T8302] netlink_rcv_skb+0x17a/0x460 [ 221.965496][ T8302] ? xfrm_dump_sa_done+0xf0/0xf0 [ 221.965511][ T8302] ? netlink_ack+0xb50/0xb50 [ 221.965550][ T8302] xfrm_netlink_rcv+0x70/0x90 [ 221.975702][ T8302] netlink_unicast+0x536/0x720 15:04:48 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 221.975720][ T8302] ? netlink_attachskb+0x770/0x770 [ 221.975735][ T8302] ? _copy_from_iter_full+0x259/0x8f0 [ 221.975752][ T8302] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 221.975768][ T8302] ? __check_object_size+0x3d/0x42f [ 221.975788][ T8302] netlink_sendmsg+0x8ae/0xd70 [ 221.975809][ T8302] ? netlink_unicast+0x720/0x720 [ 221.975825][ T8302] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 221.975844][ T8302] ? apparmor_socket_sendmsg+0x2a/0x30 15:04:48 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x3, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 221.975873][ T8302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.991189][ T8302] ? security_socket_sendmsg+0x93/0xc0 [ 221.991205][ T8302] ? netlink_unicast+0x720/0x720 [ 221.991233][ T8302] sock_sendmsg+0xdd/0x130 [ 221.991252][ T8302] ___sys_sendmsg+0x806/0x930 [ 221.991269][ T8302] ? copy_msghdr_from_user+0x430/0x430 [ 221.991294][ T8302] ? kasan_check_read+0x11/0x20 [ 221.991314][ T8302] ? __fget+0x381/0x550 [ 221.991335][ T8302] ? ksys_dup3+0x3e0/0x3e0 [ 221.991362][ T8302] ? lock_downgrade+0x880/0x880 [ 222.001686][ T8302] ? __fget_light+0x1a9/0x230 [ 222.001701][ T8302] ? __fdget+0x1b/0x20 [ 222.001717][ T8302] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.001740][ T8302] __sys_sendmsg+0x105/0x1d0 [ 222.001757][ T8302] ? __ia32_sys_shutdown+0x80/0x80 [ 222.001784][ T8302] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.001798][ T8302] ? do_syscall_64+0x26/0x610 [ 222.001815][ T8302] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.001829][ T8302] ? do_syscall_64+0x26/0x610 [ 222.001851][ T8302] __x64_sys_sendmsg+0x78/0xb0 [ 222.001882][ T8302] do_syscall_64+0x103/0x610 [ 222.011996][ T8302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.012010][ T8302] RIP: 0033:0x458079 [ 222.012025][ T8302] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.012032][ T8302] RSP: 002b:00007f50f0207c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 15:04:48 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x4, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 222.012046][ T8302] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 [ 222.012054][ T8302] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 222.012062][ T8302] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 222.012070][ T8302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f50f02086d4 [ 222.012078][ T8302] R13: 00000000004c4fe7 R14: 00000000004d8d98 R15: 00000000ffffffff 15:04:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl(r1, 0x7, &(0x7f0000000080)="eab5907ce710e6002f78e868da3eb550742d008499def90205507fa2c88910f7e1e1ed3d65d416a1bd62ac87111a984600fae926d1b365e84c126329fec37eb49f5da1122ec009b25495627d369ca7577e72c235f8e1122c5ebd9c1c00983f8325f7a3dc40d2ff0324c2c56fb957d159c2f9e6727e03cc02e3603d552ccf31a645b0bf8a51be5565a2ab1a51b1f90d1a901834bdcba4cb51fde955bfdc746aa5224614468d296fd374ab65b0ff44d382e813bc0db3b359d06798120d00dd41fcef39da6c99") r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa000000000040000300000100000000000085c260b700ff"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000850400000000000000000000000000f3a356d0a512a9ce82ae1992f773ef729a"]) 15:04:48 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x5, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:49 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sched_setparam(r0, &(0x7f00000003c0)=0x8) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c227486d91af170c5da86362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476ae772b1fde29f0c4a5615"], @ANYRESDEC=r2]], 0x8}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000340)={r4, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 15:04:49 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:49 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x220200, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f00000000c0), &(0x7f00000002c0)=0xfffffffffffffeb0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x1ff}}}, &(0x7f0000000780)=0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000007c0)={r4, 0x7}, 0x8) bind$netlink(r3, &(0x7f0000000300)={0x10, 0x0, 0x0, 0x400401}, 0xfffffffffffffffc) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x1, r0}) r5 = getpgrp(0x0) setxattr$security_smack_entry(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='security.SMACK64\x00', &(0x7f0000000940)='team0\x00', 0x6, 0x1) ioprio_set$pid(0x1, r5, 0xc3) fallocate(r1, 0x20000000200004, 0x1, 0xffffffdffffffc00) r6 = socket$inet6(0xa, 0x3, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) sendmsg$nl_generic(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="1ab5ed587bc261"], 0x14}}, 0xa1a80ebfc9a59709) ioctl$KDMKTONE(r3, 0x4b30, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000980)={0x10000, 0x1f, 0x6}) getpeername$inet(r0, &(0x7f0000000840)={0x2, 0x0, @multicast1}, &(0x7f0000000880)=0x10) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@remote={0xfe, 0x80, [0x0, 0x2a8, 0x0, 0x0, 0x8000a0ffffffff, 0x16f, 0x0, 0x0, 0x14]}, 0x8, r7}) signalfd4(r6, &(0x7f0000000280)={0xffffffffffffffc0}, 0x8, 0x80804) connect$inet6(r6, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000640)={{0xa, 0x4e22, 0x4, @ipv4={[], [], @multicast2}, 0xfffffffffffffff9}, {0xa, 0x4e23, 0x96, @remote, 0xffffffffffffff17}, 0x8, [0x4f0, 0xfc, 0x3, 0x5, 0x10001, 0xfff, 0x2, 0x81bb]}, 0x5c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000800)={0x9, 0x3}) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x0, 0xfdffffff}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 15:04:49 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) lsetxattr$trusted_overlay_redirect(0x0, &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0/file0/file0\x00', 0x14, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280)={0x0}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_mr_cache\x00') getcwd(&(0x7f0000000180)=""/60, 0x3c) sched_setparam(r0, &(0x7f00000003c0)=0x8) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="a8aa27f61c227486d91af170c5da86362be3ed942b94bde53e92b44c68d1df9ee50559ed20a668fb55476ae772b1fde29f0c4a5615"], @ANYRESDEC=r2]], 0x8}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1b1, 0x400000000074) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000340)={r4, 0x8}) rmdir(&(0x7f0000000000)='./file0/file0\x00') sendfile(r1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 15:04:49 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x6, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:49 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:49 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x7, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:49 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vcs\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5, 0x1010, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0x10, 0x3, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="faee10a40f9c95439469ac3ad12121744cc2e3ef5b9ac9a7bd18055b08e05f97d5e8a5ecc5fb348bdfab82baecd0db97371c0b144d31249791d05eb3cafef79da547dae30fcd1bdea436d0c50d1fd1445f9ff75e094c9d8beb6c205d75209bc03bfb06bb5b9e31eb4dcc11476075fced7ab87af5b7e183f5cd07f2d287f3566214b098819914d8699726ab44dd202b09b08004e1a53270b1978c542d9a9d6d7195d60145288c78644fe81f81fdfe2b09ef23536238e24b01805dc140733fdff2b1fcc9cec972e58c7209d568a616", 0xce, 0x6}, {&(0x7f0000000200)="0c6696805bb7016208d21363f0f0389c42c2f594ad", 0x15, 0x7}], 0x84000, &(0x7f0000000440)={[{@adaptive_mode='mode=adaptive'}, {@norecovery='norecovery'}, {@background_gc_sync='background_gc=sync'}, {@nolazytime='nolazytime'}, {@extent_cache='extent_cache'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@test_dummy_encryption='test_dummy_encryption'}], [{@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'root'}}]}) sendmsg(r2, &(0x7f00000000c0)={&(0x7f0000000100)=@nl, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="5500000018007f5300fe01b2a4a280930a602c0fffa843029100000b390009002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab82200ab91cf000000000085fcc7c317b99f3168e73d679600f06ce1c80a1063189597daad70d3d1e3c12d5415b0efac505467bf57d1ad4717bb19738fc1", 0x88}], 0x1}, 0x0) r3 = dup2(r2, 0xffffffffffffffff) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x0) close(r1) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000180)) 15:04:49 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:49 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x8, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:49 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x9, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:49 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ftruncate(r0, 0xfffffffffffffffe) 15:04:49 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xa, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 223.191851][ T8373] IPv6: Can't replace route, no match found [ 223.266819][ T8366] IPv6: Can't replace route, no match found 15:04:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) statfs(0x0, 0x0) pipe2(0x0, 0x80800) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x400101, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000400)=""/132) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x8000002) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0x9) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) 15:04:50 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xb, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:50 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) socket$netlink(0x10, 0x3, 0xc) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:50 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x80000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) readahead(r1, 0x3, 0x6) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000200)=""/190) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x0, r3}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$UI_DEV_DESTROY(r4, 0x5502) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000000)=0x2c5) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x2, 0x800) 15:04:50 executing program 0: memfd_create(&(0x7f0000000180)='/dev/sequencer2\x00', 0x4000005) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x40c0, 0x0) renameat2(r0, &(0x7f0000000440)='./file0\x00', r1, &(0x7f00000004c0)='./file0/../file0\x00', 0x1) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xff, 0x101000) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0, @ANYBLOB="00000700d6000400ff07"], &(0x7f0000000340)=0xe) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000380)={r4, 0x6}, &(0x7f00000003c0)=0x8) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', 0x0, &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000680)=0x0) rt_sigqueueinfo(r6, 0x37, &(0x7f00000006c0)={0x19, 0x100000000, 0x5}) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() syz_mount_image$hfs(&(0x7f0000000740)='hfs\x00', &(0x7f0000000780)='./file0\x00', 0x7, 0x3, &(0x7f0000000980)=[{&(0x7f00000007c0)="658545e14801c64e438983f2924ba94a8dceef8513c2", 0x16, 0x3}, {&(0x7f0000000800)="d7fb9fcfd0474848eb432a160779c9161d908a509250efb9061ad4be8b2ab93b5040b9e97a03c49c4377fd9381098e87cdbe9912ff31a97ef3364b09df7ff591d1cf3e733a33ed9a744bcc20c76a9ebee5689399833637e35ba60b78421f542b8e61bf39e8926486ca25ddd093c60b22a915214cfc190ce9b20c09d0478933cb33f96d36f3063c6d10aade81e894eed7765518e01811f0003f02bd8c24c299845ba6c4711bf63b4edcff915dab58e888b9cba7c5c1b307425c7da624781a6520469ca11047b1875dcce0447801dc830ce284b35d89e308f830b7bfe87acb5284cdb0aecbd6b73670a37e5661fd", 0xed, 0x7fff}, {&(0x7f0000000900)="7b9cd086c45fd490822d1aa87787c6f2ca8a3533e854d2d55c2882617efbe767498a157796b6b3a9ea16df5aab8d439e2c5d9eb1aeb90674462c500fa37a318926ddc06984b80341c14a700b726982abd807075c81f3219234258fdd3d449a4c897790eec29508", 0x67, 0x8}], 0x20000, &(0x7f0000000ac0)={[{@part={'part', 0x3d, 0x2}}, {@gid={'gid', 0x3d, r7}}, {@session={'session', 0x3d, 0x8}}, {@part={'part'}}], [{@subj_role={'subj_role', 0x3d, '/dev/dsp#\x00'}}, {@hash='hash'}, {@smackfshat={'smackfshat', 0x3d, 'sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}, &(0x7f0000cab000)=0xbf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v2, 0x14, 0x0) setresuid(r2, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 223.544950][ T8410] PKCS8: Unsupported PKCS#8 version 15:04:50 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xc, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:50 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x9}, 0x8) r4 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r4, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:50 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x4400, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="706572a9a100000000000030303030303030303030e1f5d56fc6e2fdcf617368d6d66165705d73797378656d70726f635b70726f637370757365740073797a0073797280f1f17773b703a4b1033f8ea9fcef1f9033"], 0x43) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x88) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000140)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) r4 = add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="7ac447a0d500e7f59254007c65847f9db28bfb47293b7a5a36b1d384d3f250e94f25c76529398927484fa823e6c990b81ee11c6a93fa89ef174b1244cb8720ddc664e44d912bd2a1be5cdb9cd9e13460b8c9c03b72f8dacbe5ec1bb5112da453752653a86b1df524e9960b69f09fa1d7c6e9c090539f886c6924c9187f29b02df00e0fc6cb4f74fbc07cec07267530cd498c6bdd23a242a9980620676735f2da17", 0xa1, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000003c0)={r4, 0x25a, 0xf8ff}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d6f61657020686173683d736861332d3338342d6365110000000000000000000000030000004ba40034252dda00000000000000000000000000000000000000000000000000000000000000050000000000000000"], &(0x7f0000000480)="bd808ad17795dcb8fc93668bd7dd17af2c01c9b62692069aba929fd5e611d2124f208f47863fda03d36d1d27f4ec68646978e7314dd5958641376f0b89d308e8a685e519cad7987820e44d3bd4bea09bbf9a027aa3c7fbe2745235387e00f856ce564ea2a257040e8375b345ed7e298d5e075e76b8aea13cfcfebc6538676d56081703", &(0x7f0000000540)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000740)=ANY=[@ANYBLOB="04000000000000000200000000000000010000008800000002000000000000000000000000000000070000000000000000000018c30600000000000000000000000000000000000004120000000000000000000000000000bfc64318000000006e000000000000000000008065d8eaa9a2d7adb9ffb30c000000000000000000000000000000000000000082000000000000000000000000000000"]) 15:04:50 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x80000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000300)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) readahead(r1, 0x3, 0x6) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, &(0x7f0000000200)=""/190) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000180)={0x0, r3}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$UI_DEV_DESTROY(r4, 0x5502) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000000)=0x2c5) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x2, 0x800) [ 223.756164][ T8415] e sysfs: Unknown parameter 'sysfs' 15:04:50 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xd, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:50 executing program 4: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$pppoe(0x18, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000000)=0x3d6) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x3) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000140)={0x1}) setresuid(0x0, r1, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x12400, 0x0) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000080)) [ 223.929226][ T8442] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 15:04:50 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, &(0x7f00000000c0)=0x10) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = getpid() r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x40c001, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x8, 0x200, 0x5, 0x80000000, 0x0, 0x80, 0xa006, 0x5, 0xfffffffffffffffd, 0x1, 0x670, 0xffffffff, 0x101, 0x7ff, 0xfe, 0x6, 0x7, 0x8, 0x8001, 0x4, 0x9, 0x1, 0x7fffffff, 0x1, 0x0, 0x3, 0x80000001, 0x5, 0x5, 0x2e2, 0x81, 0x9, 0xffffffff, 0x24f, 0x5f, 0x6, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x1, 0x7b, 0xfffe000000, 0x7, 0x14, 0x6, 0x80}, r1, 0x7, r2, 0x1) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae0000dc676f97daf01e23578134662c300b2c000500018701546fabca1b4e7d06a6580e88370200c54c1960b89c40ebb373", 0x39}], 0x1}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000007fc0)={0x0, 0x0, 0x0}, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x69d, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'bond_slave_0\x00'}}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x4) 15:04:50 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xe, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3f, 0x40100) accept4$bt_l2cap(r1, 0x0, &(0x7f0000000180), 0x80000) r2 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f0000000040)=0xffffffffffffffcb) 15:04:50 executing program 2: creat(&(0x7f00000001c0)='./bus\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./bus\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:passwd_exec_t:s0\x00', 0x23, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:fuse_device_t:s0\x00', 0x5, 0x10000000000003) 15:04:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000080)=@proc, 0xc) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000580)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000280)=0x80) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpid() clock_gettime(0x0, &(0x7f0000000700)) futimesat(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB=',']) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB]) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000780)) chdir(0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) sendmsg$nl_netfilter(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x14, 0x5, 0x1, 0x2000000000000001}, 0x14}}, 0x0) 15:04:50 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0xf, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x68, r1, 0xc0d, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x20342, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r3, 0x80386433, &(0x7f00000001c0)=""/159) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCFLSH(r2, 0x5437, 0x0) 15:04:50 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0x2) shutdown(r0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) shutdown(r0, 0x1) [ 224.222027][ T8467] overlayfs: missing 'lowerdir' 15:04:50 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x20001) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:50 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x407, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffff0}}}, 0xb8}}, 0x0) fstatfs(r0, &(0x7f0000000080)=""/129) [ 224.263523][ T8467] overlayfs: failed to resolve './file1': -2 [ 224.435390][ T8474] sp0: Synchronizing with TNC [ 224.459747][ T8491] overlayfs: failed to resolve './file1': -2 [ 224.502966][ T8459] overlayfs: missing 'lowerdir' 15:04:51 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8913, &(0x7f0000000200)='vet\x00\x00\x00\x00\x00\x00\x00\x00\x02\xbdh\x00') io_setup(0x5, &(0x7f0000000080)=0x0) io_getevents(r2, 0x2, 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000100)={0x77359400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 15:04:51 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x10, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:51 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000040), 0x8) r2 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x42000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r3 = dup(r1) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) mmap(&(0x7f0000257000/0x1000)=nil, 0x1000, 0x8, 0x10, r1, 0x0) [ 224.654307][ T8485] sp0: Synchronizing with TNC 15:04:51 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:51 executing program 3: socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffee8, &(0x7f0000000180)={&(0x7f0000002180)=@newae={0x5c, 0x1e, 0x713, 0x0, 0x0, {{@in6=@ipv4={[], [], @initdev}}, @in=@remote}, [@replay_esn_val={0x1c}]}, 0x5c}, 0x8}, 0x0) [ 224.709317][ T8511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:04:51 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x11, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) [ 224.813774][ T8523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:04:51 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x7, 0x200) write$P9_RREADLINK(r1, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0x1f, 0x2, 0x2, 0x7a2, 0x4, 0x80000001, 0xfffffffffffffffe, 0xba42, 0xfffffffffffffffd, 0x3, 0x3c2, 0x7f}) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="021800000700000045657e009bc4103513ed0f31c30ec6d6000000000000000001000000000000000a00040000000000c6a2365cff"], 0x38}}, 0x0) 15:04:51 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup(r0) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000340)=""/4096) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000000)={@dev, @rand_addr, 0x0}, &(0x7f0000000040)=0xc) sendmsg$nl_route(r1, &(0x7f0000002680)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002640)={&(0x7f00000024c0)=@setlink={0x168, 0x13, 0xe8417e9e90617146, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, 0x2000, 0x70000}, [@IFLA_PHYS_PORT_ID={0x8, 0x22, "0b5589"}, @IFLA_BROADCAST={0xc, 0x2, @broadcast}, @IFLA_LINK={0x8, 0x5, 0x100000000}, @IFLA_MAP={0x24, 0xe, {0x3, 0x9, 0x84, 0x964, 0x7, 0x6}}, @IFLA_XDP={0xf0, 0x2b, [@IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_FD={0x4c, 0x1, {0xf, 0x2, &(0x7f0000000140)=@raw=[@generic={0xbe8, 0x5, 0x1, 0x3, 0x95}, @exit], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x9e, &(0x7f00000001c0)=""/158, 0x41000, 0x1, [], r2, 0x1}}, @IFLA_XDP_FD={0x4c, 0x1, {0x6, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff}, [@jmp={0x5, 0x1, 0x3, 0xa, 0x9, 0x100}]}, &(0x7f00000002c0)='GPL\x00', 0x0, 0xeb, &(0x7f0000001340)=""/235, 0x41f00, 0x1, [], r2, 0x5}}, @IFLA_XDP_FD={0x4c, 0x1, {0x11, 0x2, &(0x7f0000001440)=@raw=[@alu={0x4, 0x40, 0xb, 0xe, 0x0, 0x8, 0xffffffffffffffff}, @ldst={0x1, 0x2, 0x0, 0x3, 0xb, 0x48, 0x1}], &(0x7f0000001480)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000014c0)=""/4096, 0x40f00, 0x1, [], r2, 0x3}}]}, @IFLA_PHYS_SWITCH_ID={0x18, 0x24, "4267648cce2b7a21b09db8ba23ee7573df"}]}, 0x168}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={@ipv4={[], [], @broadcast}, @loopback, @mcast2, 0x3, 0x4, 0x6, 0x400, 0x1, 0x80, r2}) getsockopt$inet6_tcp_int(r1, 0x6, 0x10, 0x0, &(0x7f0000000300)) 15:04:51 executing program 4: r0 = socket(0x1000000000000010, 0x80802, 0x0) r1 = dup(r0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) write(r1, &(0x7f0000000040)="2400000058001f03ff07f4f9002304000a04f511080001000201009f0800028001000000", 0x24) 15:04:51 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x12, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="e7561267f6499b774285c2da75dd665e2253bcad1d3af9ac9c87c2d515b85121e51e59b6a49dda2c5e8a90b56fae7b2da0c7bddd428acdba6f4f0f7fdf4f96aadc6c46c577", &(0x7f00000002c0)=""/115}, 0x18) open_by_handle_at(r0, &(0x7f0000000100)={0x10, 0xe672, "d5a3f0a216781b75"}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@delpolicy={0x6c, 0x14, 0x1, 0x0, 0x0, {{@in=@multicast1, @in6=@dev}}, [@encap={0x1c, 0x8, {0x0, 0x0, 0x0, @in=@loopback}}]}, 0x6c}, 0x8}, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x4, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r6, 0x2287, &(0x7f0000000040)=0x4e14) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VIDIOC_G_MODULATOR(r6, 0xc0445636, &(0x7f0000000140)={0xffffffff, "bf13d127a30eac0e3bf5d30cf3bb98405908be9b5cb158f43d7e7f0c212eac0e", 0x1000, 0x10, 0x400, 0x4, 0x4}) 15:04:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1f4, r2, 0x102, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x52}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'sit0\x00'}}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ed6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe24f}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa3a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffe1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8aaefda}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x558}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x304a}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x4000000}, 0x44081) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x6) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f00000000c0)="1f00000002031900000007040000068100023b0509000100110100ff3ffe58", 0x1f}], 0x1) 15:04:51 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 15:04:51 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x0, 0x0, 0x69c4}) fcntl$setpipe(r0, 0x407, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) close(r0) 15:04:51 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x13, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:52 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 15:04:52 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:52 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000a9fe0000}, 0x80, &(0x7f0000000540)}, 0x20000844) 15:04:52 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x14, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:52 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x0, 0x0, 0x69c4}) fcntl$setpipe(r0, 0x407, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) close(r0) 15:04:52 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:52 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x0, 0x0, 0x69c4}) fcntl$setpipe(r0, 0x407, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) close(r0) 15:04:52 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="0270ac234c726d52cd50c99a76a6eab21d0973e0a9ebabf420d96134fa8a2c1784c3ff", 0x23, 0x2}], 0x20, &(0x7f0000000280)={[{@lockproto_dlm='lockproto=dlm'}, {@noloccookie='noloccookie'}, {@locktable={'locktable', 0x3d, 'systemself\x14cgroup\x06wlan0eth0:(GPL*'}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)=0x4) open_by_handle_at(r0, &(0x7f0000000000)={0x8e, 0xbd, "87ddda62473e39f8371bd85f429df0ab260b6f050b68baa8cd5ca2184ff95bb170854391b5eca8f99c502b7b0be61ed836e8d82e05b0880599497b44911b24cfeca2f9c1f8588f1e7d4fc6e7e7dd5d823e6e608385196bf1b2352843f3680b3166a83b123527170933a91e286e5f427ce0dc06ef6f51166fb81645859d1da0ddd8b1b09d7c1b"}, 0x8000) accept(r1, 0x0, 0x0) 15:04:52 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x15, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 15:04:52 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:52 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:52 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:52 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x16, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:52 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:52 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="0270ac234c726d52cd50c99a76a6eab21d0973e0a9ebabf420d96134fa8a2c1784c3ff", 0x23, 0x2}], 0x20, &(0x7f0000000280)={[{@lockproto_dlm='lockproto=dlm'}, {@noloccookie='noloccookie'}, {@locktable={'locktable', 0x3d, 'systemself\x14cgroup\x06wlan0eth0:(GPL*'}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)=0x4) open_by_handle_at(r0, &(0x7f0000000000)={0x8e, 0xbd, "87ddda62473e39f8371bd85f429df0ab260b6f050b68baa8cd5ca2184ff95bb170854391b5eca8f99c502b7b0be61ed836e8d82e05b0880599497b44911b24cfeca2f9c1f8588f1e7d4fc6e7e7dd5d823e6e608385196bf1b2352843f3680b3166a83b123527170933a91e286e5f427ce0dc06ef6f51166fb81645859d1da0ddd8b1b09d7c1b"}, 0x8000) accept(r1, 0x0, 0x0) 15:04:52 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x17, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x220000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x0) 15:04:53 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) write$P9_RREAD(r0, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:53 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) 15:04:53 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x19, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:53 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:53 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b524", 0x89, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) membarrier(0x1000000000006, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:04:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:53 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) 15:04:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:53 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x1b, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:53 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x1c, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:53 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x84000, 0x0) 15:04:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:53 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:53 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x1d, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:54 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:54 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b524", 0x89, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) membarrier(0x1000000000006, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:04:54 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:54 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x2, &(0x7f0000000100)='\x00', 0x0) 15:04:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:54 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:54 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0xfeffff, &(0x7f0000000100)='\x00', 0x0) 15:04:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:54 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000400)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b4c921955fb6086244113182b8f313593c4f226eb613cd2f6ca4a388a9782d215e5884f52b2d7774001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b524", 0x89, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) membarrier(0x1000000000006, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 15:04:54 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:54 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:54 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x1000000, &(0x7f0000000100)='\x00', 0x0) 15:04:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:54 executing program 3: r0 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x42000000000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000240)={0x0, @remote}, &(0x7f0000000280)=0xc) 15:04:54 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:54 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x2000000, &(0x7f0000000100)='\x00', 0x0) 15:04:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5}}, 0x1c) getpeername$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000200)=0x1c) getsockname(r0, &(0x7f0000000000), &(0x7f00000000c0)=0x80) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000100)={[0x1, 0x0, 0xbc, 0xc, 0x1, 0x3, 0x401, 0x8, 0x401, 0x100000000, 0x0, 0x85, 0x9, 0x100, 0x16a, 0x1], 0x13000, 0x100}) 15:04:55 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:55 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:55 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0xfffffe00, &(0x7f0000000100)='\x00', 0x0) 15:04:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x5, r2, 0x14, r1}, 0x10) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ftruncate(r0, 0x80000001) 15:04:55 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:55 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0xfeffff00000000, &(0x7f0000000100)='\x00', 0x0) 15:04:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:55 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:55 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:55 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x100000000000000, &(0x7f0000000100)='\x00', 0x0) 15:04:55 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:55 executing program 0: keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x5, r2, 0x14, r1}, 0x10) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ftruncate(r0, 0x80000001) 15:04:55 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:55 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x200000000000000, &(0x7f0000000100)='\x00', 0x0) 15:04:55 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:56 executing program 0: keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x02', 0x0) 15:04:56 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:56 executing program 0: keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x5, r2, 0x14, r1}, 0x10) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ftruncate(r0, 0x80000001) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\xff', 0x0) 15:04:56 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:56 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:56 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x5, r2, 0x14, r1}, 0x10) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ftruncate(r0, 0x80000001) 15:04:56 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:56 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:56 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:57 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:57 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:57 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x5, r1, 0x14, r0}, 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r0, 0x400, 0x1) 15:04:57 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:57 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x42880) getsockopt$inet6_dccp_buf(r0, 0x21, 0x8c, &(0x7f0000000600)=""/4096, &(0x7f0000000040)=0x1000) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:57 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:57 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000040)='security\x00', 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000000)) 15:04:57 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:57 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:04:57 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x5, r1, 0x14, r0}, 0x10) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) fcntl$setlease(r0, 0x400, 0x1) 15:04:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:57 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x0) sendmsg$TIPC_NL_LINK_GET(r1, 0xfffffffffffffffe, 0x10) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) 15:04:57 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, 0x0, 0x0) 15:04:57 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs_stats_percpu\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 15:04:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000180)={0x4, 0x0, [{0x40, 0x3, 0x0, 0x0, @adapter={0x6, 0x9, 0x8, 0xffffffff, 0x3}}, {0x0, 0x7, 0x0, 0x0, @sint={0x2090, 0xffffffffffffffff}}, {0x2, 0x6, 0x0, 0x0, @sint={0x40, 0x8001}}, {0x0, 0x7, 0x0, 0x0, @msi={0x8, 0x7fffffff, 0x100}}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000080)='./file0/../file0\x00', 0x0) 15:04:58 executing program 1: request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='user\x00', 0xfffffffffffffff8) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000000c0), 0x3bd, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) r1 = getpgrp(0xffffffffffffffff) socket$vsock_dgram(0x28, 0x2, 0x0) sched_setparam(r1, &(0x7f0000000080)=0x6) 15:04:58 executing program 0: clone(0x2103011ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)={0x15, 0x75, 0x1, {0xa, "6e9cc469d8ad7f6f90e4"}}, 0x15) 15:04:58 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, 0x0, 0x0) 15:04:58 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000100)='\x00', 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x101003) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000040)=""/176) 15:04:58 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_score\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @dev}, &(0x7f0000000040)=0xc) bind$xdp(r0, &